New study highlights risk of fake popup warnings for Internet users

Sep 22, 2008

A new study by researchers at North Carolina State University shows that most Internet users are unable to distinguish genuine popup warnings messages from false ones – even after repeated mistakes. The fake ones were designed to trick users into downloading harmful software.

"This study demonstrates how easy it is to fool people on the Web," says study co-author Dr. Michael S. Wogalter, professor of psychology at NC State. The study examined the responses of undergraduate students to real and fake warning messages while they did a series of search tasks on a personal computer connected to the Internet. The real warning messages simulated local Windows operating system warnings, whereas fake messages were popup messages emanating from an exterior source via the Internet.

The physical differences between the real and the fake messages were subtle, and most participants did not discern them. Participants were fooled by the fake messages 63 percent of the time, hitting the "OK" button in the message box when it appeared on the screen despite being told that some of what they would be seeing would be false.

The ways people responded could potentially open them up to malevolent software, such as spyware or a computer virus, Wogalter says. Safer options, such as simply closing the message box, were infrequently chosen. The study was led by psychology graduate student David Sharek and co-authored by undergraduate Cameron Swofford.

Wogalter notes that companies and other credible entities may want to incorporate additional unique features into the real messages to allow people to differentiate between genuine warning messages and fake popups. However, he says, "I don't know if you could develop a legitimate message that could not be duplicated and used illegitimately."

Wogalter says the results of the study highlight the need to educate Internet users to be cautious. "Be suspicious when things pop up," Wogalter says. "Don't click OK – close the box instead."

Source: North Carolina State University

Explore further: Twitter takes note of other apps on smartphones

add to favorites email to friend print save as pdf

Related Stories

In cybersecurity, the weakest link is you

Nov 03, 2014

A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is actually ...

Hackers take over Israel army Twitter account

Jul 04, 2014

Internet hackers briefly took over an Israeli army Twitter account, the military said Friday, posting an alarming message that a nuclear facility had been hit by rocket fire.

Recommended for you

UN moves to strengthen digital privacy (Update)

Nov 25, 2014

The United Nations on Tuesday adopted a resolution on protecting digital privacy that for the first time urged governments to offer redress to citizens targeted by mass surveillance.

Spotify turns up volume as losses fall

Nov 25, 2014

The world's biggest music streaming service, Spotify, announced Tuesday its revenue grew by 74 percent in 2013 while net losses shrank by one third, in a year of spectacular expansion.

Virtual money and user's identity

Nov 25, 2014

Bitcoin is the new money: minted and exchanged on the Internet. Faster and cheaper than a bank, the service is attracting attention from all over the world. But a big question remains: are the transactions ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.