Understanding Phishing:

Invisible Characters

The phishing techniques outlined in this guide reflect a deep knowledge of HTML/CSS and Unicode. The attackers’ constant innovation on ways to embed text that’s invisible to end-users continues to ensure these phishing emails sail right through the SEGs

ivis char

These techniques exploit the growing complexity of HTML, which is now so rich and powerful that it’s impossible to predict all the ways people might style text with it.

Rather than playing the SEG’s game of whack-a-mole — looking for the specific, narrow HTML or CSS code that attackers use — at INKY we’ve developed a set of countermeasures that generalize to virtually any new method the attackers might come up with. 

What's inside this guide:

  • Examples of the tactics used to fool users
  • Techniques INKY uses to detect these scams
  • How to avoid these types of attacks on your business
  • and more!

Download this free guide to learn more.

Cybercrime Expected To Cost The World $10.5 Trillion Annually By 2025.

INKY is a cloud-based email security solution that blocks spam, malware, and — most importantly — phishing attacks. Utilizing computer vision, artificial intelligence, and machine learning INKY catches everything. Driven, curious, mobile, and growing smarter by the subject line, INKY adds a thin—but powerful— layer of protection like no other.