Source: www.securityweek.com – Author: Kevin Townsend
Received wisdom is that the older generation is a major target for cybercriminals. Kaspersky questions this, suggesting that attackers are also targeting the .
“Nearly half of Zoomers juggle multiple gigs: a full-time job, freelancing, and various side hustles. And cybercriminals have identified these polyworking young professionals as convenient targets,” notes a Kaspersky blog. This is not surprising. They are young, energetic, ambitious, and accustomed to working multiple side jobs to pay their way through university.
Gen Z comprises people currently aged 18 to 28 – from students to early career people. They represent the first generation that grew up with computers; and this combined with the polyworking habit results in a large threat surface backed by perhaps too much reliance and familiarity with modern technology.
“The assumption that older generations are more vulnerable to cyber threats isn’t always accurate. Gen Z is typically highly fluent in digital tools, but that fluency can lead to riskier behaviors – like faster click habits, password reuse and using personal devices for professional work,” comments Anne Cutler, cybersecurity evangelist at Keeper Security.
“Unlike previous generations,” continues David Matalon, CEO at Venn, “Gen Z is working from coffee shops, managing freelance clients on WhatsApp, and clicking into tens of different apps a day – all from the same laptop they use for YouTube and online shopping. That blending of personal and work life is where the real risk comes in. One phishing email or fake software update doesn’t just put them at risk; it can expose their employer, too.”
Many of the attacks are the same as everyone faces – it’s just that Gen Z presents more opportunities to the attacker. Kaspersky focuses on one area – fake employment opportunities that play on the polyworking lifestyle. Perhaps assisted by AI, modern job openings can appear very legitimate, and may be coupled with fake job interviews. But Gen Z, quite simply, is especially susceptible to social engineering because of the more relaxed attitude to work and life.
“Their behaviors often put them at greater risk. They’re especially susceptible to highly targeted social engineering attacks that mimic their everyday tools and workflows,” comments Chad Cragle, CISO at Deepwatch.
Social Engineering interviews may ask the applicant to log into a fake but malicious website for further information, and may persuade the applicant to log out of their personal Apple ID to access a fake company account. If they do so, the scammers activate Lost Mode, brick the applicant’s iPhone and extort a fee to recover it.
Advertisement. Scroll to continue reading.
“In a worst-case scenario,” warns Kaspersky, “instead of landing a new gig, you could end up with a bricked phone, malware infection, compromised personal accounts, or even losing all your money to the ‘client’.”
The red flags to watch for include big bucks for little labor, third-party payments, sign in/sign out requests, advance fee fraud through paying for training up front, and information requests that go way beyond what would be necessary for the job.
One highly recommended defense is to use a good password manager. “When you’re working across multiple roles or side gigs, managing dozens of accounts without a secure system in place, a single compromised personal or work credential can create a damaging chain reaction,” says Cutler.
“It is imperative that all generations use a secure password management tool to generate strong, unique passwords for every account – both in professional and personal lives,” she continues. “Even if one platform is compromised, the rest stay protected, and you don’t have to remember dozens of logins.”
The older generations may be less accustomed to new technology and developments, but they also tend to be more cautious. Gen Z was born with an iPad in its hands, and tends to be a bit gung ho with technology. “Their habit of installing unvetted software to solve immediate problems without involving IT or security introduces gaps that are tough to monitor or fix later,” warns Cragle.
Related: Hacker Conversations: Rachel Tobac and the Art of Social Engineering
Related: How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist
Related: Cyber Insights 2025: Social Engineering Gets AI Wings
Related: GitHub Warns of North Korean Social Engineering Attacks Targeting Tech Firm Employees
Original Post URL: https://www.securityweek.com/gen-z-in-the-crosshairs-cybercriminals-shift-focus-to-young-digital-savvy-workers/
Category & Tags: Cybercrime,cybercrime – Cybercrime,cybercrime
Views: 3