News

It Is Time To Upgrade The Cybersecurity Tools Businesses Use Back during the Dot-com boom – or what many of us now refer to as the Dot-com bubble – of the mid '90s, many exciting advents were shaping the foundation of the modern web. In 1993, the Mosaic browser made the Internet accessible to everyday users by making data “pretty” with color and simple graphics. This advent, along with the growing popularity of the home Windows and Mac, spurred rapid adoption of Internet service Read full article.
Read More
Progress Distribution adds INKY’s Anti-Phishing to its Portfolio Security distributor and sales accelerator, Progress Distribution, has added Inky to its portfolio of innovative cyber security technologies. This distribution agreement enables INKY to extend its global reach into the United Kingdom. INKY’s secure email gateway, INKY Phish Fence, uses a sophisticated three-pronged approach —  computer vision, artificial intelligence, and machine learning — to combat Deep Sea phishing attacks that other legacy solutions cannot detect. INKY Phish Fence runs as a cloud service, analyzing every external and internal email for signs of phishing, spam, and malware.
Read More
Phishing Software Firm Receives $5.6 Million Series A Funding INKY receives series A funding to enhance analytics capabilities of the software and expand sales and marketing. INKY Technology Corporation, the leading email security company based in Rockville, Maryland, announces today that ClearSky Security led the Series A round to invest $5.6 million to enhance analytics capabilities of the software and expand sales and marketing. Gula Tech Adventures also participated in the round, and Blackstone (NYSE:BX) has joined as a strategic investor. ClearSky Security Managing Director Peter Kuper has joined CEO/founder Dave Baggett, co-founder Simon Smith, and The Kroger Co. (NYSE: KR) CIO Chris Hjelm on the company’s board of directors.
Read More
INKY Protects Businesses From Phishing Attacks By Mixing Artificial Intelligence TL; DR: Using a unique blend of technologies, Inky’s Phish Fence mail protection gateway shields users from sophisticated phishing attacks. The program alerts users to emails disguised to look like they’ve been sent internally, and detects strange characters and sketchy links, sending users warnings so they’re educated about phishing attempts. The tool is easy to set up and allows administrators access to a dashboard that shows them the threats that exist in their organization Read full article.
Read More
INKY Phish Fence Can Now Protect G Suite Accounts INKY announces that INKY Phish Fence can now protect G Suite accounts from phishing with the INKY Phish Fence Chrome extension. INKY Phish Fence instantly analyzes a G Suite email and warns the user if there is anything suspicious, misleading or fraudulent about the email. Email-based phishing now dominates headlines, driving over a billion dollars a year of wire fraud and widespread identity theft. Uniquely, INKY Phish Fence marshals over two dozen machine learning algorithms to identify and block these new phishing strains, by examining headers, text, domain names, and imagery to spot forgeries that humans miss.
Read More
How to stop spear-phishing cold Many hacks start with a spear-phishing attack, often aimed at the top of the corporate hierarchy. How do I hack thee? Let me count the ways. Among others, I hack thee to the depth and breadth and height of a spear-phishing attack (apologies to Elizabeth Barrett Browning). By now, you may be aware that many of the most devastating hacks that have occurred in recent history—the Democratic National Committee (DNC), Yahoo, the W-2 scam—have been launched from a base of information or access garnered by sending a poisoned email with tailored details to a specific individual, who then becomes the vector for the rest of the attack. Read full article.
Read More