All resources sponsored by:

Inky Technology

22 Matches
Understanding Phishing: Banner Effectiveness
sponsored by Inky Technology
WHITE PAPER:Putting banners in email to alert recipients to the potential dangers lurking in messages can be a highly effective way to keep employees safe from phishing attacks. But for this to be effective, you have to know which emails to flag. View this white paper to learn how INKY’s Phish Fence determines which emails to warn users about.
Posted: 12 Apr 2021 | Published: 12 Apr 2021
Get This Now


Understanding Phishing: Computer Vision
sponsored by Inky Technology
WHITE PAPER:View this guide to learn how INKY uses visual analysis to figure out important features of each incoming email and matches it with other information to ward off phishing attacks.
Posted: 30 Mar 2021 | Published: 30 Mar 2021
Get This Now

TOPICS:  Phishing

The Top 25 Most Phished Brands
sponsored by Inky Technology
RESEARCH CONTENT:The stats are in! Uncover the top 25 most-phished brands during 2020, picked up by INKY’s tool, INKY Phish Fence.
Posted: 30 Mar 2021 | Published: 30 Mar 2021
Get This Now

TOPICS:  Phishing

INKY vs. Microsoft Defender for Office 365
sponsored by Inky Technology
PRODUCT OVERVIEW:This solution brief pits INKY against Microsoft’s Defender for Office 365 (MSDO) – exploring the similarities and differences between the offerings and highlighting a few key examples of phishing scams INKY caught, but MSDO didn’t – read on to get started.
Posted: 30 Mar 2021 | Published: 30 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Inky 2020 End of Year Phishing Report
sponsored by Inky Technology
RESEARCH CONTENT:With most people working remote in 2020, reliance on email for communication grew even higher – leading to a stark rise in phishing attacks. This report reflects on the top threat types and security strategies for phishing in 2020 and offers insight into what to expect in 2021 – read on to unlock the full report.
Posted: 20 Jan 2021 | Published: 20 Jan 2021
Get This Now


Stimulus Phishing Report: The Newest Wave of Pandemic Phish Are Attacking Without Conscience
sponsored by Inky Technology
WHITE PAPER:Phishing attacks have always been one of the most prominent and pervasive cyberthreats facing organizations – but the 2020 pandemic gave rise to a new wave of phishing tactics and entry points. Read this report for a closer analysis (with examples) of the phishing tactics facing today’s inboxes.
Posted: 02 Dec 2020 | Published: 02 Dec 2020
Get This Now


Credential Harvesting: Virtually Hijacking Your Employee’s Credentials
sponsored by Inky Technology
RESOURCE:Credential harvesting is an approach often used by hackers to virtually hijack your employee’s accounts simply by using their password(s). In this INKY blog post, take a closer look at how credential harvesting works and what practices your organization can implement to minimize the risk.
Posted: 08 Oct 2020 | Published: 08 Oct 2020
Get This Now


Hidden Text and Zero Font Attacks
sponsored by Inky Technology
RESOURCE:You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.
Posted: 07 Oct 2020 | Published: 07 Oct 2020
Get This Now


Exploiting a Pandemic Coronavirus Stimulus Package Economic Impact Payments
sponsored by Inky Technology
WHITE PAPER:COVID-19 has introduced a flurry of phishing scams related to the virus, and millions of people have become victims as a result. But perhaps the most convincing of these attacks are the ones purporting to be from the US Federal Reserve offering to provide financial assistance. Read this white paper to see examples of these convincing emails.
Posted: 07 Oct 2020 | Published: 07 Oct 2020
Get This Now


Top COVID-19 Phishing Scams
sponsored by Inky Technology
RESOURCE:Phishing scammers have taken advantage of the frequent updates regarding COVID-19 information to use it as an entry point for their campaigns. This article, Top COVID-19 Phishing Scams, looks at the emerging threat types and what to look for to identify an attack – read on to get started.
Posted: 06 Oct 2020 | Published: 06 Oct 2020
Get This Now


Invisible Characters
sponsored by Inky Technology
WHITE PAPER:Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 06 Oct 2020 | Published: 06 Oct 2020
Get This Now


Global Phishing Pandemic? You Be the Judge.
sponsored by Inky Technology
RESOURCE:Since the start of the COVID-19 health crisis, complaints to the FBI’s Internet Crime Complaint Center (IC3) have more than tripled. Why are there so many of these coronavirus-related email phishing threats and where are they coming from? View this article to get a link to a free report of COVID-19 phishing examples around the world.
Posted: 05 Oct 2020 | Published: 05 Oct 2020
Get This Now


Dually Deceptive: Two New Phishing Scams Swimming by Your SEG
sponsored by Inky Technology
RESOURCE:Phishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.
Posted: 05 Oct 2020 | Published: 05 Oct 2020
Get This Now


CEO Impersonation
sponsored by Inky Technology
WHITE PAPER:Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Posted: 02 Oct 2020 | Published: 02 Oct 2020
Get This Now


Zoom & Doom: How INKY Unraveled A Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE:Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020
Get This Now


Exploiting a Pandemic Coronaphish COVID-19 Phishing Scams
sponsored by Inky Technology
WHITE PAPER:Phishing scams are constantly evolving, seeking out more effective ways to bypass security measures and trick recipients. In this edition of Understanding Phishing, explore how the COVID-19 pandemic has changed phishing campaigns by dissecting a few real-world examples.
Posted: 01 Oct 2020 | Published: 01 Oct 2020
Get This Now


The New Normal: Working from Home and Phishing Threats
sponsored by Inky Technology
RESOURCE:It’s estimated that during the COVID-19 pandemic, close to 50% of the US workforce is remote – this massive and sudden transition towards remote work is known as the “new normal”. With this change in workplace comes a change in cyberthreats – with phishing being the most prominent. Read this blog post to learn more.
Posted: 01 Oct 2020 | Published: 01 Oct 2020
Get This Now


Email Security vs. Email Privacy: What You Need to Know
sponsored by Inky Technology
RESOURCE:Since it was first introduced, email has blown up into a business-critical communication tool. However, its popularity has led to an innumerable amount of cyberattacks over the years. In this blog post, explore the differences between email security and email privacy – and discover how to achieve both.
Posted: 30 Sep 2020 | Published: 30 Sep 2020
Get This Now


Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER:Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 30 Sep 2020 | Published: 30 Sep 2020
Get This Now


Is Your Company’s Online Security Strategy Enough?
sponsored by Inky Technology
RESOURCE:Cyberattacks are costly - $10.2 billion in the U.S. alone to be exact. It’s proven that businesses are underprepared for cyberattacks, and what’s more is that every person at an organization who has an email account is vulnerable to threats. Read this article on how you can improve email security and get access to a free demo download.
Posted: 29 Sep 2020 | Published: 29 Sep 2020
Get This Now


Exploiting a Pandemic White House COVID-19 Phishing Scams
sponsored by Inky Technology
EBOOK:It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.
Posted: 29 Sep 2020 | Published: 29 Sep 2020
Get This Now


Around the World in 34 Phish: Covid-19 Phishing Examples
sponsored by Inky Technology
RESOURCE:The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.
Posted: 28 Sep 2020 | Published: 28 Sep 2020
Get This Now


22 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences