Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    Cisco: Web 3.0 Will be the Next Frontier for Social Engineering and Phishing Attacks

    Cisco: Web 3.0 Will be the Next Frontier for Social Engineering and Phishing Attacks

    A look at what makes up Web 3.0 and how it may be used includes insight into what kinds of cyberattacks may plague it, as cybercriminals look for new profitable opportunities.

    If you’re not familiar with the term “Web 3.0”, it’s the broad-stroke way to refer to emerging technologies that include cryptocurrency, blockchain technology, decentralized applications and decentralized file storage. Researchers at Cisco recently hypothesized what it may take to secure Web 3.0 applications, infrastructure, and technologies.

    Among the predictions was one I whole-heartedly believe will come true – far more quickly than any other – that includes cybercriminals finding “new ways of phishing, or social engineering designed to separate users from the contents of their cryptocurrency wallets.” We’ve already seen examples of cybercriminal activity focusing efforts on scamming victims out of their precious crypto, including token presales, crypto mining, purchases of fake mining equipment, and more.

    As cryptocurrency wallets become more mainstream, I fully expect cybercriminals to focus their energies on dissecting how crypto wallets, transfers, etc. all work, looking for ways to “hack” the system – much in the same way we see a push for identifying more zero-day attacks.

    It’s only a matter of time. And while most businesses don’t see any use case where they need to participate in Web 3.0, the “metaverse”, etc., it will simply be a matter of time until opportunities to make money via Web 3.0 become commonplace.

    Until then, social engineering and phishing will continue to occur here in the “real world”, making it necessary for organization to have security controls in place that include continual Security Awareness Training for their users to elevate each user’s state of vigilance when interacting with potentially malicious content in email and the web.


    Free Phishing Security Test

    Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

    PST Results

    Here’s how it works:

    • Immediately start your test for up to 100 users (no need to talk to anyone)
    • Select from 20+ languages and customize the phishing test template based on your environment
    • Choose the landing page your users see after they click
    • Show users which red flags they missed, or a 404 page
    • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
    • See how your organization compares to others in your industry

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/phishing-security-test-partner?partnerid=001a000001lWEoJAAW

    Sign Up to the TIO Intel Alerts!

    Back To Top