Some people get more phishing emails than others — here's why

Phishing
(Image credit: Shutterstock)

If you've ever wondered why your parents or grandparents may seem like they're constantly inundated with scam and phishing emails, new research might give some insight.

According to Google and Stanford University, researchers who analyzed more than 1 billion phishing and malware emails found that certain demographics and localities were the primary targets.

Phishing is when cybercriminals target people through email, telephone, or text messages in an attempt to "phish" out personal information, such as credit cards or Social Security numbers

In other scams, an email or instant message might promise a new iPad upon completing a survey, after which shipping and handling might need to be paid through a credit card. Something like this is obviously a scam.

Google and Stanford University found that individuals who have had their email accounts leaked to the internet after a data breach saw phishing attempts increase dramatically.

By volume, U.S. residents are hit with the largest amount of phishing emails, accounting for 42% of all attacks. The U.K. came second, with one in 10 being targeted. Japan came third with one in 20. Oddly, Australia saw the highest number of attacks per capita. 

English is still the language of choice for phishing schemes. Even then, criminals do localize their efforts. In Japan, 78% of emails were in Japanese, and in Brazil, 66% came in Portuguese. 

Age also plays a factor. Persons between 55-64 years of age were 1.64 times more likely to be hit with an attack when compared to the 18-24 demographic.

Mobile-only users had lower odds of being targeted, 20% less than multi-device users. According to Google and Stanford, this could stem from socioeconomic factors with phishers targeting those who they perceive to be more affluent. 

Google claims its Gmail service prevents 99% of phishing attempts from ever reaching its users. Still, cybercriminals are constantly finding new ways to get around Google's protections, meaning it's up to individuals to be that last layer of defense. 

Google recommends users use the Security Checkup function to see if their Google account has any vulnerabilities.

TOPICS
Imad Khan

Imad is currently Senior Google and Internet Culture reporter for CNET, but until recently was News Editor at Tom's Guide. Hailing from Texas, Imad started his journalism career in 2013 and has amassed bylines with the New York Times, the Washington Post, ESPN, Wired and Men's Health Magazine, among others. Outside of work, you can find him sitting blankly in front of a Word document trying desperately to write the first pages of a new book.

Latest in Online Security
A picture of a skull and bones on a smartphone depicting malware
Hundreds of malicious Android apps with 60 million downloads found spamming Android users with ads and stealing credentials
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
An FBI agent typing on a computer
FBI issues warning to millions of Americans to avoid these websites that can steal your passwords and banking info
A hacker typing quickly on a keyboard
New MassJacker malware is hijacking digital wallets to steal large sums from users
iPhone 15 Pro Max shown in hand
5 iPhone settings you should always shut off — because they’re a security nightmare
A woman using her laptop securely with a cup of coffee in hand
5 common mistakes people make when shopping for antivirus software
Latest in News
NYTimes Connections
NYT Connections today hints and answers — Wednesday, March 19 (#647)
Chromecast with Google TV connected to display
Google finally pushes out full Chromecast fix for users who factory reset — here’s what to do
A picture of a skull and bones on a smartphone depicting malware
Hundreds of malicious Android apps with 60 million downloads found spamming Android users with ads and stealing credentials
Switch 2 console and logo
Nintendo Switch 2 rumor just tipped possible release date — and it's much sooner than we thought
Hacker typing on laptop in darkened room
Hackers create "BRUTED" tool to attack VPNs – how to stay safe
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs