The United States Patent and Trademark Office has issued Iconix's tenth patent titled "Authenticating and Confidence Marking E-Mail Messages." The abstract for U.S. Patent 10,110,530, dated October 23, 2018, states: "Methods and systems for authenticating and confidence marking e-mail messages are described. One embodiment describes a method of authenticating an e-mail message. This method involves extracting a plurality of e-mail headers associated with the e-mail message, and identifying a sending edge mail transfer agent (MTA). The method then calls for determining if the sending edge MTA is authorized to send the e-mail message."
In a recent article entitled Phishing Is the Internet’s Most Successful Con, the Atlantic observes: Phishing doesn’t attack computers. It attacks the people using computers. The Sting - The Art of the Con Cormac Herley, a principal researcher at Microsoft Research, observes in the article: Many security-professional and media recommendations exhort eternal vigilance, paying attention to every detail. This is terrible advice. I’m a professional with years of experience in this space and I don’t bother to inspect my emails or carefully read all my URLs: I have things to do. As a strategy for the constant level of [...]
The United States Patent and Trademark Office has issued Iconix's ninth patent titled "Rapid Identification of Message Authentication." The abstract for U.S. Patent 10,063,545, dated August 28, 2018, states: "Techniques are presented for uniquely identifying authentication associated with messages. A message is inspected for sender or domain identifying information associated with a sender of the message or a sender's domain. The identifying information is authenticated, and if authentication, then distinctive metadata is associated with the message. The distinctive metadata is presented or played in connection with the message for purposes of readily identifying the authentication.” Prof. Arun Vishwanath, Iconix’s Science [...]
On May 7, 2018, the FBI published its report of online crimes, 2017 Internet Crime Report. This vis summaries the FBI's findings: The largest losses were attributed to the Business Email Compromise/Email Account Compromise in which the victim is tricked into sending money to criminals. This crime is almost exclusively committed using deceptive emails. Deceptive emails are also used to commit other internet crimes such as data breaches, identity theft, phishing, and ransomware. SP Guard fights email deception by helping users identify suspicious emails.
ICONIX, Inc., the industry leader in visual email solutions, announced that the United States Patent and Trademark Office has issued Iconix’s eighth patent titled “System and Method for Securely Performing Multiple Stage Email Processing With Embedded Codes.” The abstract for U.S. Patent 9,325,528, dated April 26, 2016, states: “A system and method for performing email processing at multiple stages along an email delivery chain.” Technology from this patent is applicable to all of the Iconix® offerings, including the Iconix Truemark® service, which helps protect consumer users from phishing attacks, and Iconix SP GuardTM, which helps protect enterprises from spear-phishing attacks. The [...]
ICONIX, Inc., the industry leader in visual email solutions, announced on September 15, 2015, that the United States Patent and Trademark Office has issued Iconix's seventh patent titled "User interface for email inbox to call attention differently to different classes of email." The abstract for U.S. Patent 9,137,048, dated September 15, 2015, states: "Sender emails have their Truemarks (icons) displayed in the sender column of a list view” and “fraudulent emails have a fraud icon displayed with a warning in the sender column.” Technology from this patent is used in all of the Iconix® offerings, including the Iconix Truemark® service, which [...]
We have posted two more videos on our YouTube Channel. In “Fighting Phishing” we how you can take the email interface back from attackers. In “The Inbox That Works” we demonstrate the Truemark service for consumers.
In For Email Newsletters, a Death Greatly Exaggerated, David Carr of the New York Times writes about the resilience of email as a means of communication. Carr writes: An email newsletter generally shows up in your inbox because you asked for it and it includes links to content you have deemed relevant. In other words, it’s important content you want in list form, which seems like a suddenly modern approach... It makes sense. My personal digital hierarchy, which I assume is fairly common, goes like this: email first, because it is for and about me; social media next, because it is [...]
The Los Angeles Times is reporting that new research from the State University of North Carolina shows that people are easily deceived by targeted emails. The researchers found that although people were aware of how spearphishing worked and confident in their abilities to avoid deception, people were, nevertheless, deceived. Before taking the test, 89% of the subjects said they were confident that they could spot spearphishing emails. When put to the test, just 4 of the 53 subjects were able to correctly spot the spearphishing messages. More than half of the test subjects missed more than half of the fake [...]
According to recent research published by Forrester Research, “Consumer Email Attitudes Improve.”, consumers are more engaged with email. Forrester compared research conducted since 2006 that showed these very important consumer shifts in email attitudes: Consumers forward promotional email more often: In 2010, 12% of consumers say they sometimes forward promotional email to others, up from the 10% in 2008, and 9% in 2006. Fewer messages deleted without reading: In 2010, 59% of consumers said they delete most email messages without reading them, down from the 63% in 2008 and the 73% in 2006. Integrate email promotions and personal email: Only [...]