All resources sponsored by:

Inky Technology

1 - 25 of 33 Matches
Anatomy of a Ransomware Attack
sponsored by Inky Technology
BLOG:To put it simply, kidnapping your files and data and then holding it hostage until a ransom is paid sums up your basic ransomware attack. Read this blog article to learn about the 6 steps that makeup a ransomware attack, what to do when an attack occurs and more.
Posted: 24 Nov 2021 | Published: 25 Nov 2021
Get This Now

TOPICS:  .NET

Fresh Phish: Microjacking: Stealing Logins to Send Phishing Emails
sponsored by Inky Technology
BLOG:As phishing variants continue to emerge, legacy anti-phishing software sometimes fails to detect them, especially when it comes to “Microjacking” – hijacking another's Microsoft’s resources to host phishing attacks. This blog post provides a closer look at how Microjacking attacks operate – read on to get started.
Posted: 24 Nov 2021 | Published: 24 Nov 2021
Get This Now

TOPICS:  .NET

The Evolution of Ransomware and What You Need to Know Today
sponsored by Inky Technology
BLOG:Read this blog post to learn about the history of ransomware and how it affects businesses today. See how the first ransomware attack happened, how the world of cybercrime has changed since then and the two keys to fighting ransomware every business should follow.
Posted: 24 Nov 2021 | Published: 24 Nov 2021
Get This Now

TOPICS:  .NET

Fresh Phish: Attackers Impersonate U.S. Department of Transportation to Harvest Microsoft Credentials
sponsored by Inky Technology
CASE STUDY:Between Aug. 16-18, INKY detected 41 phishing emails attempting to impersonate the U.S. Department of Transportation. The basic pitch was, with $1T of government money flowing through the system, you are being invited to bid for some of this bounty. Read this case study to view this attempt in detail.
Posted: 22 Nov 2021 | Published: 22 Nov 2021
Get This Now

TOPICS:  .NET

Fresh Phish: The Adobe Spark “Request for Proposal” Scam
sponsored by Inky Technology
CASE STUDY:Beginning in January 2021, several INKY users began receiving emails with fake RFPs. These supposed RFPs came from recipients’ legitimate contacts that had been compromised by bad actors. In this case, phishers were staging their forays from Adobe Spark, a cloud-based design application. Read this case study to see how they did it.
Posted: 22 Nov 2021 | Published: 22 Nov 2021
Get This Now

TOPICS:  .NET

Fresh Phish: Rising Value and Visibility of Coinbase Attracts Impersonators
sponsored by Inky Technology
CASE STUDY:Recently, the prominence of Coinbase, a crypto trading company, has attracted a new wave of phishing attacks aimed at Coinbase users. The attackers impersonated Coinbase and tried to get users to give up their login credentials. Read this blog post to view INKY’s analysis of the attack and best practices for defending against ones like it.
Posted: 22 Nov 2021 | Published: 22 Nov 2021
Get This Now

TOPICS:  .NET

Fresh Phish: Phishers Get Clever, Use Math Symbols for Verizon Logo
sponsored by Inky Technology
BLOG:Recently, data analysts at INKY began to see a pattern of attacks impersonating Verizon, the large U.S.-based telecommunications provider. What made these attacks interesting was their use of mathematical symbols as part of the Verizon logo. Dive into this blog to learn what INKY uncovered with these phishing attacks.
Posted: 19 Nov 2021 | Published: 19 Nov 2021
Get This Now

TOPICS:  .NET

Phishing Statistics: What an Attack Costs Your Business
sponsored by Inky Technology
BLOG:There has been a 64.4% increase in data breaches over the past 6 years, and many of these breaches start with a phishing attack. Open this blog to dive into the statistics of phishing and what you need to know about phishing and email security.
Posted: 19 Nov 2021 | Published: 19 Nov 2021
Get This Now

TOPICS:  .NET

Fresh Phish: Fake Mandatory Covid-19 Vaccine Form
sponsored by Inky Technology
BLOG:In one of the most recent phishing campaigns to hit INKY customers, bad actors sent emails that spoofed recipients’ human resources (HR) department, requiring them to submit fake COVID-19 vaccination forms. Read this article for a recap of the attackers’ techniques and best practices for defending against similar attacks.
Posted: 18 Nov 2021 | Published: 18 Nov 2021
Get This Now

TOPICS:  .NET

Advancing Phishing Protection – The Analysts Perspective on INKY
sponsored by Inky Technology
BLOG:When it comes to selecting a third-party email security solution, it’s hard to know what you can and can’t believe. The sheer number of self-proclaimed phishing experts makes for murky waters. Read this blog post featuring two 451 research analysts discussing 10 ways INKY is a cut above the rest for phishing protection.
Posted: 18 Nov 2021 | Published: 18 Nov 2021
Get This Now

TOPICS:  .NET

Bitcoins, Cryptocurrency, and Cybercrime: What Phish Fighters Should Know
sponsored by Inky Technology
BLOG:The rise in ransomware attacks – especially those causing a ripple effect down to consumers – has put the spotlight on several issues surrounding the war on cybercrime. When it comes to preventing costly phishing attacks, time is of the essence. Access this blog for everything you should know when it comes to phishing attacks.
Posted: 17 Nov 2021 | Published: 17 Nov 2021
Get This Now

TOPICS:  .NET

The Microsoft Table Logo Impersonation Scam
sponsored by Inky Technology
RESEARCH CONTENT:In January 2021, we began to see a new phishing technique that featured cleverly constructed emails infused with an HTML table impersonating the Microsoft logo. This Inky Technology report, The Microsoft Table Logo Impersonation Scam, analyzes this most recent discovery. Read on to learn more.
Posted: 17 Nov 2021 | Published: 17 Nov 2021
Get This Now

TOPICS:  .NET

Fresh Phish: Urgency, Mail Relay Serve Phishers Well on Craigslist
sponsored by Inky Technology
BLOG:Craigslist, a website people still use to find things locally and urgently, has become the latest phishing hot spot. In addition to the inherent pressure of its marketplace, a feature on the site that appeals to phishers is the mail relay function. Read this article to learn how to prevent yourself from falling victim to phishing.
Posted: 16 Nov 2021 | Published: 16 Nov 2021
Get This Now

TOPICS:  .NET

Looking for a Few Good Email Accounts
sponsored by Inky Technology
WHITE PAPER:One of the most damaging forms of phishing involves account takeover. In these attacks a bad actor harvests the password for an email account, and then uses this account to impersonate a person that can often have devastating results.Download this white paper to learn how INKY uses machine learning capabilities to combat email phishing threats.
Posted: 16 Nov 2021 | Published: 16 Nov 2021
Get This Now

TOPICS:  .NET

Risking a 1 in 10 Chance of a Catastrophic Phishing Event
sponsored by Inky Technology
WHITE PAPER:The truth is that the best-looking phishing emails are the most dangerous – especially when the threat actor replicates a perfect HTML copy of a real organization’s email with a very small tweak. Download this white paper to learn how INKY’s cloud-based email security offering aims to block spam, malware and phishing attacks.
Posted: 15 Nov 2021 | Published: 15 Nov 2021
Get This Now

TOPICS:  .NET

7 of the Biggest Phishing Scams of All Time
sponsored by Inky Technology
WHITE PAPER:Falling for a phishing attack isn’t just annoying—for some companies, phishing attacks can cost hundreds of millions of dollars and incalculable reputational damage. Read this short blog post to learn how 7 of the biggest phishing scams of all time happened and discover some strategies you can use to make sure you don’t join that ignominious list.
Posted: 12 Oct 2021 | Published: 12 Oct 2021
Get This Now

TOPICS:  Email Security

INKY Computer Vision
sponsored by Inky Technology
VIDEO:MSPs need to know that they’re being protected from ransomware and other dangerous security threats that come from phishing emails. Watch this short video to learn how INKY’s computer vision technology helps identify even the most advanced of fake emails that would typically fool an end user.
Posted: 12 Oct 2021 | Premiered: 21 Mar 2021
Get This Now


Understanding INKY: Using Trusted Banners for Email Security Awareness
sponsored by Inky Technology
WHITE PAPER:Email banners can be a subtle but effective way to help recipients identify and appropriately handle inbound email messages, including phishes and other threats. Read this white paper to learn more about banner implementation and the potential benefits this simple approach holds for MSPs.
Posted: 08 Oct 2021 | Published: 08 Oct 2021
Get This Now


How a Ransomware Attack Unfolds
sponsored by Inky Technology
WHITE PAPER:As recent, high-profile attacks have highlighted, ransomware (often perpetrated via phishing) is a huge risk for MSPs worldwide. Access this INKY white paper to learn how phishing attacks play out, explore strategies you can use to fight them, and discover how INKY’s mathematical and behavioral models stop ransomware attacks before they happen.
Posted: 07 Oct 2021 | Published: 07 Oct 2021
Get This Now


Why INKY for Managed Services?
sponsored by Inky Technology
WHITE PAPER:INKY, a cloud-based email security platform designed with MSPs in mind, offers simple but powerful protection that is easy to deploy and manage. Access this short white paper to learn what makes INKY’s security offering attractive to so many businesses.
Posted: 07 Oct 2021 | Published: 07 Oct 2021
Get This Now


Which deployment model is right for me?
sponsored by Inky Technology
WHITE PAPER:While many businesses now offer API-based solutions to enhance email security, particularly aimed at phishing, these tactics aren’t always the best approach. Access this white paper to learn how inline email security differs from API-based security and discover why INKY thinks that their standard model works best for customers.
Posted: 06 Oct 2021 | Published: 06 Oct 2021
Get This Now


Understanding Phishing: Banner Effectiveness
sponsored by Inky Technology
WHITE PAPER:Putting banners in email to alert recipients to the potential dangers lurking in messages can be a highly effective way to keep employees safe from phishing attacks. But for this to be effective, you have to know which emails to flag. View this white paper to learn how INKY’s Phish Fence determines which emails to warn users about.
Posted: 12 Apr 2021 | Published: 12 Apr 2021
Get This Now


Understanding Phishing: Computer Vision
sponsored by Inky Technology
WHITE PAPER:View this guide to learn how INKY uses visual analysis to figure out important features of each incoming email and matches it with other information to ward off phishing attacks.
Posted: 30 Mar 2021 | Published: 30 Mar 2021
Get This Now

TOPICS:  Phishing

The Top 25 Most Phished Brands
sponsored by Inky Technology
RESEARCH CONTENT:The stats are in! Uncover the top 25 most-phished brands during 2020, picked up by INKY’s tool, INKY Phish Fence.
Posted: 30 Mar 2021 | Published: 30 Mar 2021
Get This Now

TOPICS:  Phishing

Hidden Text and Zero Font Attacks
sponsored by Inky Technology
RESOURCE:You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.
Posted: 07 Oct 2020 | Published: 07 Oct 2020
Get This Now


1 - 25 of 33 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences