Exploiting our mental shortcuts - Deepstash

Bite‑sized knowledge

to upgrade

your career

Ideas from books, articles & podcasts.

Exploiting our mental shortcuts

Phishing emails manipulate us via mental shortcuts. There are seven shortcuts or psychological principles of influence that can be exploited by phishers. These include authority, commitment, liking, perceptual contrast, reciprocation, scarcity and social proof.

An example of reciprocity could be getting an emailed coupon and being asked to click on a button to sign up for the retailer's newsletter. 

1

STASHED IN:

68

MORE IDEAS FROM THE SAME ARTICLE

How people of different ages react to  phishing tactics, according to a study:

  • Nearly half of the participants fell for the phishing emails.

  • Women over age 62 were the most susceptible.
  • Younger adults (18-37) were more susceptible to emails ...

Phishing emails are designed to bypass logic and manipulate our emotions.

Phishing is effective because it appeals to our biases and emotions. It tries to get us to make a decision quickly without considering possible biases. This leaves us open to unwise decisions.

When you receive an email that asks for important information such as passwords or account numbers, or request payments, offer freebies, especially downloads:

  • Take a moment to verify if the email is coming from a legitimate address or organization.
  • Realize what you co...

It is a scam by which an internet user is deceived into revealing personal or confidential information which can be used illicitly.

At least 3.4 billion phishing emails are sent out worldwide every day.

Phishing scams account for half of all fraud attacks.

When it comes to phishing emails, you can lose everything with just a click.

You can give away your most important personal or financial information, download a destructive virus or install malware on your computer that compromises your files.

Discover and save more ideas by creating a

FREE

Deepstash account.

Develop a

reading habit

, save

time

and create an amazing

knowledge library

.

GET THE APP:

MORE LIKE THIS

Cyber attacks

Due to the pandemic, home and professional lives have merged. Employees are taking their work computers to home networks, potentially opening the door for hackers.

Mobile devices are less protected than computers, and spy apps make it easy for hackers to intrude into these devices. This is ...

STASHED IN:

5

Internet Addiction Disorder

Unlike chemical addictions that may come to mind more easily, Internet Addiction Disorder (IAD) is not caused by a substance. It is part of behavioural addictions, along with gambling disorder, gaming disorder, and more. That doesn’t make it less serious, and it can still dramatically affect some...

3

STASHED IN:

10

Growing older without a spouse or adult children means you'll need to build support who can help with your finances, make medical decisions and prevent you from becoming isolated as you grow older (extended family, trusted friends, and paid professionals):

  • Find people who will manage...

1

STASHED IN:

112