Credit: Thinkstock The SANS Institute has some controversial advice for computer security professionals looking to lock down their networks: spear-phish your employees.That’s what the U.S. Military Academy at West Point did in 2004 to a group of 512 cadets, selected at random for a test called the Carronade. The cadets were sent a bogus e-mail that looked like it came from a fictional colonel named Robert Melvillle, who claimed to be with the academy’s Office of the Commandant. (The real Robert Melville helped invent a short-range naval cannon called the Carronade nearly 250 years ago.)“There was a problem with your last grade report,” Melville wrote, before telling the cadets to click on a webpage and “follow the instructions to make sure your information is correct.”More than 80 percent of the cadets clicked on the link, according to a report on the experiment. Worse still, even after hours of computer security instruction, 90 percent of freshmen cadets still clicked on the link.Spear-phishing attacks contain this kind of targeted information in order to seem more credible, but their goal is the same as a regular phish: Trick the user into doing something he shouldn’t, like giving up sensitive information. Because these attacks rely on cooperation from their victims, it’s hard to prevent them, said Alan Paller, director of research with SANS. “The only defense against spear phishing is to run experiments on your employees and embarrass them,” he said.Paller’s organization compiles an annual report on the top to Internet security targets. This year, “human vulnerabilities” will make their first appearance on a list that is typically made up of software products like Internet Explorer, databases and file-sharing applications.That’s because the human factor is being exploited in a growing number of targeted attacks as more and more online criminals come online in Eastern Europe and Asia, Paller said.Although Microsoft’s Windows operating system has long been the prime target of online attackers, the software giant has tightened up its security practices over the past few years.But that hasn’t deterred attackers, Paller said. In fact, 2006 witnessed a surge in attacks that take advantage of unpatched vulnerabilities in new types of programs, like office applications, media players, backup software and voice-over-IP servers, Paller said. “We’ve been pretending that the problem would go away as Microsoft got better, but we forgot that every other company wrote software with as little care for its security as Microsoft did,” he said. Changes to the Windows operating system have prevented widespread worm attacks from spreading, but Internet users are no more secure than they were during the time of Sasser and Slammer, Paller said. “The average user is significantly less secure,” he said. “And it isn’t because the vendors have gotten worse at all; it’s because the number of bad guys has exploded.”The 2006 Top 20 Internet Security Vulnerabilities report will be unveiled Wednesday in conjunction with the United Kingdom’s National Infrastructure Security Coordination Center.-Robert McMillan, IDG News Service (San Francisco Bureau) Related content news Zendesk to lay off another 8% of its staff, cites macroeconomic issues The new tranche of layoffs comes just six months after the company let go of 300 staffers and hired a new CEO in order to navigate its operations through macroeconomic distress. By Anirban Ghoshal Jun 01, 2023 3 mins CRM Systems IT Jobs feature 5 CxOs on leading change To be the agents of change that businesses require today, IT leaders must embrace a flexible mindset, prep their orgs for change, and recognize that intention and purpose are vital to empowering transformation. By Dan Roberts Jun 01, 2023 13 mins Digital Transformation Change Management IT Leadership feature Top 8 data engineer and data architect certifications Data engineers and data architects are in high demand. Here are the certifications that will give your career an edge. By Thor Olavsrud Jun 01, 2023 9 mins Certifications Big Data Data Mining events promotion Australia's CIO50 Team of the Year Awards finalists revealed Along with the unveiling of the annual CIO50 List and the team category winners, the 2023 CIO50 Awards will also recognise the inaugural Next CIO winner and a new Hall of Fame recipient. By Cathy O'Sullivan May 31, 2023 3 mins IDG Events Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe