Iconix Issued Eighth U.S. Patent For Email

ICONIX, Inc., the industry leader in visual email solutions, announced that the United States Patent and Trademark Office has issued Iconix’s eighth patent titled “System and Method for Securely Performing Multiple Stage Email Processing With Embedded Codes.” The abstract for U.S. Patent 9,325,528, dated April 26, 2016, states: “A system and method for performing email processing at multiple stages along an email delivery chain.”   Technology from this patent is applicable to all of the Iconix® offerings, including the Iconix Truemark® service, which helps protect consumer users from phishing attacks, and Iconix SP GuardTM, which helps protect enterprises from spear-phishing attacks.  The [...]

Compromise Monday – Now What?

Last week saw an inauspicious beginning to Cybersecurity Awareness Month with user data compromises announced at: The American Banker Association, number undisclosed T-Mobile, 15 million, over 2 years ending Sept. 16, 2015 Scottrade, 4.6 million during late 2013 and early 2014 Patreon, the crowdsourcing website, 2.3 million users Now you are aware of Cybersecurity. What next?  You can't fix your vendors. You can have some more free credit monitoring to augment the free monitoring you got when Anthem lost your records, or Target, or Neiman Marcus, or The Office of Personnel Management, or [fill in the blank]. Let's look at how credit monitoring [...]

2017-01-07T17:35:10-05:00October 5th, 2015|Consumers and Email, Cybersecurity - General|

Iconix Issued Seventh U.S. Patent For Email

ICONIX, Inc., the industry leader in visual email solutions, announced on September 15, 2015, that the United States Patent and Trademark Office has issued Iconix's seventh patent titled "User interface for email inbox to call attention differently to different classes of email." The abstract for U.S. Patent 9,137,048, dated September 15, 2015, states: "Sender emails have their Truemarks (icons) displayed in the sender column of a list view” and “fraudulent emails have a fraud icon displayed with a warning in the sender column.” Technology from this patent is used in all of the Iconix® offerings, including the Iconix Truemark® service, which [...]

How Do Hackers Infiltrate Systems?

The accounts of tens of millions of Anthem members are stolen.  $1 billion are stolen from banks. Sony Pictures is compromised. The Chinese steal US military aircraft plans. The President of the United States decries the losses and appoints someone to fix the problem.  Yet, what is the problem?  Professor Arun Vishwanath, writing in  The Conversation tells us that the system resource being exploited over and over and over again isn't some router or disk drive or program -- it is you, the person operating the machine. It's You! In Before decrying the latest cyberbreach, consider your own cyberhygiene, [...]

Jimmy Kimmel Demonstrates Social Engineering

The keys to your cyber kingdom are your passwords.  All your money, your contacts, your calendar and the photos you won't show your mom are protected by the power of your password.  You know that.  Bad guys know that.  That is why bad guys want passwords.  They use social engineering techniques to steal passwords. What is social engineering?  How hard is it to manipulate people into divulging this crucial cyber security information?  Jimmy Kimmel shows us:  

2017-01-07T17:35:13-05:00January 30th, 2015|Consumers and Email, Cybersecurity - General|

CNN – Simple Spearphishing Attacks Very Effective

Writing in CNN Opinion, Professor Arun Vishwanath of the University at Buffalo discusses the ease with which hackers can invade networks using spearphishing.  He writes: Hackers often enter networks through simple phishing attacks, attacks that these days are actually simpler but more insidious than the infamous Nigerian phishing scams. Now, instead of trying to persuade you to part with your money in exchange for a nonexistent financial windfall, emails from trusted sources ask you to check out a photograph, click on a hyperlink to an interesting story or enter your login on an official-looking webpage. Complying with any of these [...]

2017-01-07T17:35:13-05:00December 17th, 2014|Consumers and Email, Cybersecurity - General, spear phishing|

Iconix Issued Sixth U.S. Patent For Email

On December 2, 2014, the United States Patent and Trademark Office issued Iconix its sixth patent titled "RAPID IDENTIFICATION OF MESSAGE AUTHENTICATION." The abstract for U.S. Patent 8,903,742, dated December 2, 2014, states: "Techniques are presented for uniquely identifying authentication associated with messages.” Iconix filed the patent on October 10, 2011. Technology from this patent is used in all of the Iconix® offerings, including the Iconix Truemark® service, which helps protect consumer users from phishing attacks, and Iconix SP GuardTM, which protects enterprises from spear-phishing attacks. The Iconix services utilize the two main forms of email authentication – Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) – to [...]

Sony Hacked Again

It is being widely reported in the press that Sony has been hacked again. Unreleased movies are now posted on line. Confidential HR data has been released. Employees have taken a step back into the 1980's, replacing email with telephones, handwritten notes and fax machines (Mommy, whats a fax machine?").   Nobody knows who did this, but the suspicion is that North Korea has done this in retribution for the pending release of a movie found objectionable by the PRK government. re/code has good coverage of this evolving story. How could the PRK infiltrate Sony networks?  HP looked at this issue [...]

2017-01-07T17:35:14-05:00December 2nd, 2014|Consumers and Email, SP Guard, spear phishing|

Google Discovers — People

Google, in association with the University of California, San Diego, has released research which analyses spearphishing attacks against gmail accounts from 2011-2014. The researchers found that the success of a spearphishing attacks ranged from a low of 3% to a high of 45%.  The researchers determined that the greater the effort put into the targeting of the message, the higher the probability of a successful attack. The researchers made this observation regarding financial scam attacks: Thus, despite the appearance of simplicity, in reality, the scam emails are well-formed and thought-out in a way to maximize efficiency by preying on known human physiological [...]