Many anti-phishing products rely on a database of signatures, rendering them defenseless against a phishing attack until a signature is developed and deployed. Inky is different.
Each month, 1.5 million new phishing sites are created. This means that standard phishing protections like URL blacklists, are of limited utility since the number of URLs to be checked grows so rapidly. The length of time that it takes for a signature to be released for a piece of malware depends on its
How Does Inky Identify Zero Day Phishing Attacks?
Microsoft Office Macros
Macros are a feature of Microsoft Office that allow users to automate repetitive tasks. However, Office Macros are extremely powerful and, if allowed to execute, can install malware on a computer. Phishers will create malicious Office documents and attach them to a phishing email that convinces readers to open them and allow macros to run.
Adobe’s Acrobat Reader is notorious for being prone to vulnerabilities that can be exploited to run code on a computer. Phishers take advantage of this by creating PDFs designed to install malware and attaching these PDFs to phishing emails. The emails will be crafted to convince readers to open the PDF, infecting their computer.
Want to See Inky in Action?
See Inky in action with a free scan of your inbox or get in touch to get a demo from one of our experts.