ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Inky Technology

  • What to Do If You Responded to a Phishing Scam

    According to the National Cyber Security Alliance, 60% of small and midsized organizations that fall victim to a hacker go out of business within six months. To avoid being the next business on the list, access this blog to learn more about what to do if you responded to a phishing scam and how to prevent future malware disasters.

  • Fresh Phish: Phishers Cast COVID Lures Drawing Victims to Freemail Traps

    Last month, INKY detected 2 separate credential harvesting operations that abused email marketing platforms such as Campaign Monitor and Mailchimp. The two phishing assaults were similar in structure, but they differed in detail. Read on to learn how to prevent successful phishing attacks with real examples.

  • Effective Email Security Platforms Are More Than Just Banners

    In a recent ESG Showcase entitled ‘Quashing the Phishing Epidemic’, senior analyst Dave Gruber spoke to an often-overlooked aspect of phishing attacks that, when implemented properly, can deliver a sharp reduction in successful phishing attacks. It involves education – the right way. Read this blog post to learn key takeaways from the showcase.

  • Quashing the Phishing Epidemic

    New, innovative email security solutions that directly involve the end-user are showing real promise in combating email-borne threats. Read more in this latest ESG report.

  • Anatomy of a Ransomware Attack

    To put it simply, kidnapping your files and data and then holding it hostage until a ransom is paid sums up your basic ransomware attack. Read this blog article to learn about the 6 steps that makeup a ransomware attack, what to do when an attack occurs and more.

  • Fresh Phish: Microjacking: Stealing Logins to Send Phishing Emails

    As phishing variants continue to emerge, legacy anti-phishing software sometimes fails to detect them, especially when it comes to “Microjacking” – hijacking another's Microsoft’s resources to host phishing attacks. This blog post provides a closer look at how Microjacking attacks operate – read on to get started.

  • The Evolution of Ransomware and What You Need to Know Today

    Read this blog post to learn about the history of ransomware and how it affects businesses today. See how the first ransomware attack happened, how the world of cybercrime has changed since then and the two keys to fighting ransomware every business should follow.

  • Fresh Phish: Attackers Impersonate U.S. Department of Transportation to Harvest Microsoft Credentials

    Between Aug. 16-18, INKY detected 41 phishing emails attempting to impersonate the U.S. Department of Transportation. The basic pitch was, with $1T of government money flowing through the system, you are being invited to bid for some of this bounty. Read this case study to view this attempt in detail.

  • Fresh Phish: The Adobe Spark “Request for Proposal” Scam

    Beginning in January 2021, several INKY users began receiving emails with fake RFPs. These supposed RFPs came from recipients’ legitimate contacts that had been compromised by bad actors. In this case, phishers were staging their forays from Adobe Spark, a cloud-based design application. Read this case study to see how they did it.

  • Fresh Phish: Rising Value and Visibility of Coinbase Attracts Impersonators

    Recently, the prominence of Coinbase, a crypto trading company, has attracted a new wave of phishing attacks aimed at Coinbase users. The attackers impersonated Coinbase and tried to get users to give up their login credentials. Read this blog post to view INKY’s analysis of the attack and best practices for defending against ones like it.

  • Fresh Phish: Phishers Get Clever, Use Math Symbols for Verizon Logo

    Recently, data analysts at INKY began to see a pattern of attacks impersonating Verizon, the large U.S.-based telecommunications provider. What made these attacks interesting was their use of mathematical symbols as part of the Verizon logo. Dive into this blog to learn what INKY uncovered with these phishing attacks.

  • Phishing Statistics: What an Attack Costs Your Business

    There has been a 64.4% increase in data breaches over the past 6 years, and many of these breaches start with a phishing attack. Open this blog to dive into the statistics of phishing and what you need to know about phishing and email security.

  • Advancing Phishing Protection – The Analysts Perspective on INKY

    When it comes to selecting a third-party email security solution, it’s hard to know what you can and can’t believe. The sheer number of self-proclaimed phishing experts makes for murky waters. Read this blog post featuring two 451 research analysts discussing 10 ways INKY is a cut above the rest for phishing protection.

  • Fresh Phish: Fake Mandatory Covid-19 Vaccine Form

    In one of the most recent phishing campaigns to hit INKY customers, bad actors sent emails that spoofed recipients’ human resources (HR) department, requiring them to submit fake COVID-19 vaccination forms. Read this article for a recap of the attackers’ techniques and best practices for defending against similar attacks.

  • Bitcoins, Cryptocurrency, and Cybercrime: What Phish Fighters Should Know

    The rise in ransomware attacks – especially those causing a ripple effect down to consumers – has put the spotlight on several issues surrounding the war on cybercrime. When it comes to preventing costly phishing attacks, time is of the essence. Access this blog for everything you should know when it comes to phishing attacks.

  • The Microsoft Table Logo Impersonation Scam

    In January 2021, we began to see a new phishing technique that featured cleverly constructed emails infused with an HTML table impersonating the Microsoft logo. This Inky Technology report, The Microsoft Table Logo Impersonation Scam, analyzes this most recent discovery. Read on to learn more.

  • Fresh Phish: Urgency, Mail Relay Serve Phishers Well on Craigslist

    Craigslist, a website people still use to find things locally and urgently, has become the latest phishing hot spot. In addition to the inherent pressure of its marketplace, a feature on the site that appeals to phishers is the mail relay function. Read this article to learn how to prevent yourself from falling victim to phishing.

  • Looking for a Few Good Email Accounts

    One of the most damaging forms of phishing involves account takeover. In these attacks a bad actor harvests the password for an email account, and then uses this account to impersonate a person that can often have devastating results.Download this white paper to learn how INKY uses machine learning capabilities to combat email phishing threats.

  • Risking a 1 in 10 Chance of a Catastrophic Phishing Event

    The truth is that the best-looking phishing emails are the most dangerous – especially when the threat actor replicates a perfect HTML copy of a real organization’s email with a very small tweak. Download this white paper to learn how INKY’s cloud-based email security offering aims to block spam, malware and phishing attacks.

  • 7 of the Biggest Phishing Scams of All Time

    Falling for a phishing attack isn’t just annoying—for some companies, phishing attacks can cost hundreds of millions of dollars and incalculable reputational damage. Read this short blog post to learn how 7 of the biggest phishing scams of all time happened and discover some strategies you can use to make sure you don’t join that ignominious list.

  • INKY Computer Vision

    MSPs need to know that they’re being protected from ransomware and other dangerous security threats that come from phishing emails. Watch this short video to learn how INKY’s computer vision technology helps identify even the most advanced of fake emails that would typically fool an end user.

  • Understanding INKY: Using Trusted Banners for Email Security Awareness

    Email banners can be a subtle but effective way to help recipients identify and appropriately handle inbound email messages, including phishes and other threats. Read this white paper to learn more about banner implementation and the potential benefits this simple approach holds for MSPs.

  • How a Ransomware Attack Unfolds

    As recent, high-profile attacks have highlighted, ransomware (often perpetrated via phishing) is a huge risk for MSPs worldwide. Access this INKY white paper to learn how phishing attacks play out, explore strategies you can use to fight them, and discover how INKY’s mathematical and behavioral models stop ransomware attacks before they happen.

  • Why INKY for Managed Services?

    INKY, a cloud-based email security platform designed with MSPs in mind, offers simple but powerful protection that is easy to deploy and manage. Access this short white paper to learn what makes INKY’s security offering attractive to so many businesses.

  • Which deployment model is right for me?

    While many businesses now offer API-based solutions to enhance email security, particularly aimed at phishing, these tactics aren’t always the best approach. Access this white paper to learn how inline email security differs from API-based security and discover why INKY thinks that their standard model works best for customers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.