It’s that time of year! We’re all having fun planning our Halloween costumes. What’s not so fun? Cybercriminals are doing the same thing. Just as you can put on a Dracula outfit and look the part, criminals can camouflage their emails to present a perfect facade, too — of a brand you trust. But crooks don’t have to buy their costumes: a phisher — let’s call him Vlad the Impaler — can just take a real email from, say, Apple, save its HTML content, and modify a few links. Vlad can then resend a perfect-looking Apple mail from a plausible sounding server like “apple-mail-gateway.com” and … trick or treat.
The recent inaugural Infosecurity North America featured a pitching contest for start-up companies to a judging panel of venture capitalists. The winner was phishing protection solution provider Inky. The company said that it produces the Phish Fence which is built on machine learning technologies and protects users from so-called 'deep sea' phishing emails that use clever tricks and realistic looking branding elements to fool both users and traditional mail protection software. Read full article.
West Sealand Digital, a Guernsey Cyber Security Specialist, has announced an International partnership agreement with USA based Inky Technology Corporation, for the distribution of their industry-leading anti-phishing solution. Statistics show that the majority of data breaches start with a phishing email, putting any organisation at risk of a cyber-attack. New data protection laws require organisations to ensure their employees can quickly and easily spot phishing emails, to become the first line of defence. Read full article.
With cities facing increasing cyber challenges — including high-profile attacks on cities including Baltimore, Atlanta and Naples, FL — cybersecurity has become both a booming industry and a necessity. Last October, the New York City Economic Development corporation announced plans for a $100 million public-private program to foster the cybersecurity industry with the goal of creating 10,000 cybersecurity jobs. The investments included the creation of a Global Cyber Center co-working space in Chelsea and a Hub.NYC accelerator to develop new startups. A large focus is also on education, including a Cyber Boot Camp training program and the creation of a degree program at CUNY in partnership with Facebook. Read full article.
NYCx Cybersecurity Moonshot Challenge attracts 169 proposals aimed to deliver innovative digital security solutions to small businesses. The finalists will publicly pitch and demonstrate their concepts in New York City.
INKY Technology Corporation, an email protection startup that leverages the power of unique computer vision and artificial intelligence (AI), announced the release of the company’s 2018 Q4 email security report, Welcome to 2019: Phishing Gets Personal. The holiday period is typically the peak time of year for online shopping, and with that comes higher rates of cyber-crime, especially phishing scams. This Q4 of 2018 was a busy period for phishing scammers. INKY researchers saw a spike in email volume this time of year as people use email to gather their receipts from online shopping, shipping notifications, returns, and virtual holiday greetings. INKY pulled out the highest volume attack types and broke down each one. The majority of attacks that were analyzed showed an increase in target personalization, making them considerably more difficult to detect. Read full article.
October was Cybersecurity Month in Maryland and throughout the month, the state’s cybersecurity sector made headlines. Maryland Commerce rolled out two tax credit programs designed to spur investment and growth in the cyber sector. The Cybersecurity Investment Incentive Tax Credit provides an incentive for those investing in Maryland cybersecurity companies and the Buy Maryland Cybersecurity Tax Credit incentivizes purchases of security technology and products from Maryland companies. Read full article.
Rockville, Md.-based INKY makes a cloud-based email security platform powered by unique computer vision, artificial intelligence and machine learning. The company has a main goal to stop attacks on company inboxes, allow people to have confidence in the messages they are receiving and know that the people interacting with them are who they say they are, INKY Cofounder and CEO Dave Baggett told Technical.ly. Baggett also cofounded ITA Software, the airfare search company purchased by Google in 2011 for $730 million which now powers Google Flights. INKY has been in business selling its email security solution for about a year. This week, the company announced the release of its flagship product INKY Phish Fence, which detects phishing attacks using computer vision, artificial intelligence and machine learning. The software is designed to protect enterprises from widespread phishing, spear phishing and extortion attacks. Read full article.
Phishing -- from bulk spam phishing to more targeted spear-phishing and business email compromise (BEC) attacks -- is the number one attack vector faced by business today. According to Wombat, 76% of organizations experienced phishing attacks in 2017. According to Symantec, by the end of 2017 the average user received 16 malicious emails per month. According to the FBI, global BEC losses from October 2013 to December 2016 had reached $5.3 billion -- a figure that Trend Micro believes could expand to $9 billion for 2018 alone. INKY, founded in 2008 by Dave Baggett and Simon Smith, has today launched a new AI-based anti-phishing product: INKY Phish Fence. The product is designed to recognize phishing emails. It integrates with Office 365 and Google Cloud services. Incoming mail can be marked clean, suspicious or malicious. Such emails can be dropped, quarantined, or delivered with an inserted banner (yellow or red) to warn the user. Read full article.
INKY, a startup that provides protection against email spoofing and phishing services, emerged from stealth mode on Tuesday and announced its “INKY Phish Fence” product. The product helps organizations detect spoofing attempts whereby attackers hijack a domain to pose as a credible entity. It also uses “anomaly detection algorithms” to warn employees of suspicious emails and detect spearpshing and extortion attempts. Read full article.