CURRENTLY ON AIR ⇒
  • No Show Scheduled

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Study finds agreeable personalities prime targets for Cybercriminals: Stellenbosch University Findings

Azra Hoosen | ah@radioislam.co.za
10 May 2024 | 13:30 CAT
2 min read

In a groundbreaking study conducted by University of Stellenbosch system analyst Vian Smit, startling revelations have emerged about the vulnerability of agreeable individuals to cybercriminal manipulation.

Released amidst a concerning surge in cybercrime victimization, the study sheds light on the psychological dynamics at play, suggesting that those with trusting dispositions are at heightened risk. However, amidst these findings, glimmers of hope emerge as the research unveils potential resilience among neurotic and open-minded individuals against falling prey to cyber scams.

Smit surveyed nearly 700 individuals to examine their personality traits and propensity to fall for various social engineering attacks. These attacks involve cybercriminals deceiving individuals into disclosing private information and passwords or clicking on harmful links, aiming to gauge their vulnerability to such tactics.

Speaking to Radio Islam, Smit highlights that cybercriminals exploit our psychological needs, such as the desire for social acceptance, trust, and approval, to manipulate us. By employing social engineering tactics, they aim to trigger these psychological needs, compelling individuals to share private information.

“These cybercriminals typically use social engineering attacks, which utilise psychological manipulation techniques to exploit human vulnerabilities,” he said.

According to Smit, individuals with an agreeable personality are characterised by traits such as compassion, altruism, friendliness, trust, and kindness. Their desire to please and help others makes them vulnerable to social engineering attacks, as they may overlook signs of deceit or manipulation.

“These character traits make them more susceptible to social engineering attacks. These attacks follow certain phases, and in this, they can determine the personality type of their victims, then execute the further steps of the cycle,” he said.

The study indicated that individuals with agreeable personalities are prone to various cyberattacks such as phishing, spear phishing, impersonation, pretexting, watering hole, QRishing, and smishing. Neurotic types are vulnerable to fake applications or plug-ins attacks, while extroverts are targeted by malvertisements and Wi-Fi evil twin attacks. Conscientious individuals are susceptible to a range of attacks including phishing, spear phishing, impersonation, pretexting, watering hole, and QRishing, whereas open-minded individuals are more prone to pretexting, watering hole, and Wi-Fi evil twin attacks.

Smit suggests that understanding people’s personality types and their vulnerability to social engineering attacks could assist cybersecurity teams in businesses and organisations. This understanding would enable the implementation of tailored mitigation strategies for each personality type. Additionally, organisations would be better equipped to identify employees who are more susceptible to such attacks through a deeper comprehension of their personality traits.

LISTEN to the full interview Ml M. Waja and System Analyst Vian Smit, here. 

 

 

 

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

The ASRI Report

The ASRI Report

Sameera Casmod | sameerac@radioislam.co.za 15 November 2024 | 12:26 CAT 3-minute read Ebrahim Rasool, who served as South Africa’s ambassador to the US under Obama’s administration, will be returning to Washington as ambassador for the second Trump presidency. His...

read more
The Asia-Pacific Report

The Asia-Pacific Report

Sameera Casmod | sameerac@radioislam.co.za 14 November 2024 | 12:00 CAT -minute read North Korea and Russia ratify defence deal North Korea ratified the Comprehensive Strategic Partnership through a decree signed Monday. The defence treaty, described in a report on AP...

read more

Subscribe to our Newsletter

0 Comments