• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Submissions
  • About Us
  • Contact Us
  • Aug 8, 2022
  • Startup
    • Creating a Plan
    • Funding a Startup
    • Franchise Center
    • Getting Your Office Ready
    • Making Your Business Official
    • Marketing Your New Business
    • Personal Readiness
  • Run & Grow
    • Customer Service
    • Human Resources
    • Innovation
    • Legal
    • Operations
    • Risk Management
  • Leadership
    • Best Practices
    • Communication
    • Green Initiatives
    • Open Culture
    • Strategic Planning
    • People Skills
  • Sales & Marketing
    • Advertising and Lead Generation
    • Marketing Innovations
    • Marketing Plans
    • Online Marketing
    • Relationships
    • Sales Activities
  • Finance
    • Budgeting and Personal Finance
    • Payments and Collections
    • Tax and Accounting
    • Pricing Strategy
    • Working with Investors
    • Working with Lenders
  • Tech
    • eCommerce
    • Hardware
    • Software
    • Security
    • Tech Reviews
    • Telecom
  • Shop

SmallBizClub

Helping You Succeed

Home / Technology / Security / The History of Phishing and How to Remain Protected
The History of Phishing and How to Remain Protected

The History of Phishing and How to Remain Protected

2194 Views

Nov 19, 2019 By Brian Wallace

Although the earliest forms of electronic mail trace back to 1965, e-mail was never intended to be secure. That is, however, because there was never anything to secure email from. The service of electronic mail lingered problem-free until the infancy of spam, and later, phishing. Today, 92% of malware is delivered via email; simultaneously, spam makes up over half of all emails. The underlying question is: how did the epidemic begin?

Phishing is a complex topic for those unfamiliar with technology and cybersecurity. In short, phishing is when a hacker tricks someone into giving them money or account access over email. Pretending to be a trusted colleague or brand, they fool the victim. Saying this, it is important to know how phishing derived.

Phishing is a form of spam. In 1978, Gary Thuerk sent the first mass, spam email to 397 ARPANET users. ARPANET was essentially the foundational platform email was built on. Thuerk’s spam move was so infamous, no one tried it again until 1988 when gamers got ahold of spam knowledge. Multi-user dungeons (MUD) games were extremely popular in these times, and high-tech skilled players began spamming their rivals’ accounts with junk email to crash their systems and prevent them from playing.

In 1993, Richard Depew became the first person to refer to “junk mail” as “spam” in reference to a Monty Python skit sharing the same name. The following year, the second attempt at mass spamming was made by a set of lawyers with a desire to advertise their business. In the end, Laurence Canter and Martha Siegel wrote a book defending the practice of spam.

At this point in history, spam was not seen as a security threat, but instead a mere annoyance. This is, until, phishing came along. The Warez community began using random credit card generators in the 1900s, stealing and hacking accounts of AOL users to open fake accounts. This grew so out of hand that AOL even stepped in, introducing new security measures that stopped the use of randomly generated credit card numbers in 1995; but by that time, the Warez community had already moved on to a new scam.

In 1996, the term “phishing” was officially created by a user in an AOL messaging forum: “AOL for free?,” alt.2600, January 28, 1996. The message read, “It used to be that you could make a fake account on AOL so long as you had a credit card generator. However, AOL became smart. Now they verify every card with a bank after it is typed in. Does anyone know of a way to get an account other than phishing?” – @mk590.

Phishing has never had a problem moving with time. As we are in the “cloud” era of time, phishing has quickly adapted. As email has become the weakest link in middle-manning phishing attempts, there are ways to protect your data in addition to what comes with your email account. Starting with DMARC, SPF, and DKIM tools could be great methods to preserve your data.

Becoming a victim of phishing can truly happen to anyone. Interestingly enough, in 2018, the FBI received nearly 50,000 reports of phishing and compromised email. In summation, this racked up a $1.8 billion cost. Staying protected starts with knowing the technology in front of you.

The History and Future of Phishing [infographic]

Courtesy of Avanan

 

Filed Under: Security Tagged With: Data, Email, Infographics, Security

Source: Avanan

Brian Wallace

Brian Wallace

Brian Wallace is the Founder and President of NowSourcing, an industry leading infographic design agency based in Louisville, KY and Cincinnati, OH which works with companies that range from startups to Fortune 500s. Brian also runs #LinkedInLocal events nationwide, hosts the Next Action Podcast, and has been named a Google Small Business Advisor for 2016-2018.

Related Posts

  • Improving Data Integrity at Your Small Business
  • 5 Reasons It’s a Great Time to Invest in EDI Software
  • tis-the-season-for-online-scamsSmall Businesses at Higher Risk of Being Scammed than Large Companies

Primary Sidebar

Random

6 Best Practices to Optimize Your Google Business Profile

Aug 5, 2022 By SmallBizClub

You Can and Should Skip Entry-level Jobs

Aug 5, 2022 By Ryan Kidman

8 Factors That Influence The Price of an Aerial Platform

Aug 4, 2022 By SmallBizClub

Are You Making These Costly Shipping Mistakes?

Aug 4, 2022 By SmallBizClub

Supply Chain Management: An Important Aspect Of Customer Service

Aug 4, 2022 By SmallBizClub

Footer

About Us

Small Biz Club is the premier destination for small business owners and entrepreneurs. To succeed in business, you have to constantly learn about new things, evaluate what you’re doing, and look for ways to improve—that’s what we’re here to help you do.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Copyright © 2022 by Tarkenton Institute, Inc. All Rights Reserved | Terms | Privacy