Tech Wavo
  • Home
  • Technology
  • Computers
  • Gadgets
  • Mobile
  • Apps
  • News
  • Financial
  • Stock
Tech Wavo
No Result
View All Result

Most people still can’t identify a phishing attack written by AI – and that’s a huge problem, survey warns

Tech Wavo by Tech Wavo
September 30, 2025
in Computers
0




  • Yubico warns social engineering attacks are getting more powerful thanks to AI
  • Gen Z are the most susceptible to phishing
  • Almost half have never received any cybersecurity training

We’ve all heard the warnings about the damage social engineering can do – but one particular demographic still stands out as the most susceptible to attacks – and it might not be who you think.

New research from Yubico claims Gen Z workers (those born between 1997 and 2012) are the ones letting the side down, with an alarming 62% reporting having engaged with a social engineering attack (opening an attachment, clicking a link, etc.) in the past year.

Social engineering attacks are not just becoming more frequent, but more powerful too – it’s been widely reported how AI-powered phishing attacks are on the rise and getting smarter, claiming more victims than ever with convincing deepfakes and voice clones.


You may like

Low confidence

In fact, a large majority (70%) of those surveyed said they believe phishing attempts have become more successful thanks to the use of AI, and a staggering 78% have seen these become more sophisticated.

When presented with a phishing email, the majority (54%) believed it was authentically written by a human, or were unsure, highlighting how convincing these attacks have become – although respondents of all ages scored similarly in this task.

Worryingly, a large proportion of workers reported never having received cybersecurity training (40%), and the deployment rate for Multi-factor authentication (MFA) is just under half (48%) – meaning a large proportion of organizations are left unprotected on a very basic level.

Only 26% of those surveyed considered passwords to be the most secure authentication method, but they remain the most common – with 56% using them for work accounts and 60% using them for their personal accounts.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

If you’re going to rely on passwords, make sure you choose one that’s ultra-safe – we’ve listed some tips on creating a secure password to help you stay safe online.

You might also like

Previous Post

The best October Prime Day deals on Anker charging gear and other accessories

Next Post

Save on machines from iRobot, Shark, Dyson and others

Next Post
Save on machines from Shark, iRobot, Dyson and more

Save on machines from iRobot, Shark, Dyson and others

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Venmo and PayPal users will finally be able to send money to each other

by Tech Wavo
September 30, 2025
0
Venmo and PayPal users will finally be able to send money to each other
Computers

Venmo and PayPal — two of the most popular apps for digitally sending money to friends, family, or businesses —...

Read more

17 best early Prime Day deals for less than $50 – Lego, Echo, Blink, Apple, and more

by Tech Wavo
September 30, 2025
0
17 best early Prime Day deals for less than $50 – Lego, Echo, Blink, Apple, and more
Computers

While the second Prime Day sale of the year isn't officially set to kick off until next week, I've already...

Read more

Survival climbing game Cairn has been delayed until 2026

by Tech Wavo
September 30, 2025
0
Survival climbing game Cairn has been delayed until 2026
Computers

The survival climbing game Cairn has been delayed until the first quarter of 2026. Development studio The Game Bakers had...

Read more

Apple accused of firing worker over religious practices

by Tech Wavo
September 30, 2025
0
Apple accused of firing worker over religious practices
Technology

Apple has been hit with a federal lawsuit accusing the company of denying religious accommodations and engaging in retaliatory firing.Apple...

Read more

Site links

  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of use
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of use

No Result
View All Result
  • Home
  • Technology
  • Computers
  • Gadgets
  • Mobile
  • Apps
  • News
  • Financial
  • Stock