"Phish" is pronounced just like it's spelled, which is to say like the word "fish" — the analogy is of an angler throwing a baited hook out there (the phishing email) and hoping you bite. The term arose in the mid-1990s among hackers aiming to trick AOL users into giving up their login information. The "ph" is part of a tradition of whimsical hacker spelling, and was probably influenced by the term "phreaking," short for "phone phreaking," an early form of hacking that involved playing sound tones into telephone handsets to get free phone calls.
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, social media post, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack or the revealing of sensitive information.
SafeToOpen is an Internet-based service that helps businesses detect targeted phishing attacks and verifies the trustworthiness of the contents of your emails. SafeToOpen uses your business profile to scan all Internet links (URLs) and attachments from your emails to make sure your emails are safe to open.
No. SafeToOpen is installed within your physical or cloud environment and no email is sent out to anyone. SafeToOpen only verifies the URLs with our Central Threat Intelligence (or CTI) to make sure they are safe to click. The figure below depicts an example of the SafeToOpen deployment in AWS.
Yes. Most email security solutions rely only on the reputational history of websites, they are very generic, and target a wide range of businesses. Also, none of the email security products responds to reported suspicious emails. SafeToOpen, on the other hand, is an additional security layer that is tailored to secure your business against localised and targeted phishing attacks. It also replies to all reported suspicious emails.
1- Reported Emails: Your staff (and customers) reports suspicious emails to SafeToOpen. SafeToOpen verifies all reported emails and replies to your staff with a simple recommendation.
2- Servers Logs: Your servers logs are a great source of information for identifying new Phishing websites and only SafeToOpen is able to make the best use of them.
3- Text Messages: Your customers may receive phishing text (Smishing) messages. They can report/verify to/with SafeToOpen.
4- Social Media Feeds: SafeToOpen is able to look for all feeds/posts in multiple Social Media platforms and detect Phishing Web sites.
No. SafeToOpen has the ability to ignore an email with specific email subject or sender domain. Once SafeToOpen receives emails that match these criteria, it will ignore processing them. Hence it does not interfere with your simulation practice. Instead, it counts the reported emails and shows it on the dashboard.
No, Internet attackers may block accesses from certain countries but SafeToOpen resides in the country of your business. Hence, if victims can access a phishing URL, SafeToOpen can do too. In addition, SafeToOpens' engines IP addresses are dynamically changing to avoid being detected and blacklisted by the attacker.
Yes. SafeToOpen fully supports RESTful API and can communicate with most of RESTful API-based tools including Microsoft Office 365, SIEM solutions, and some web proxies.
No. SafeToOpen is not an email security gatway and should not be replaced by one. SafeToOpen does not process all incoming/ourgoing emails. It only analyses the emails that have been reported to it.