Computer Vision News - December 2018

Phishing emails come in two forms. The first, spear phishing , resembles an email from someone important, either inside or sometimes outside of a company. For example, an employee named Lisa receives an email that looks like it came from her coworker a few weeks ago, when in fact, it actually came from an impersonator. This is also referred to as CEO impersonation or business email compromise . The second type of phishing involves forgery of a brand such as a fake Microsoft message that alerts the user that they have exceeded their mail quota and directs them to log in to fix it. When the person clicks on the link, they do not open an actual Microsoft site. They enter their password anyway, giving the attacker their Microsoft Office password. On one hand, Inky has algorithms that block the spear phishing or individual person impersonation cases. On the other hand, they have computer vision algorithms that help identify and block brand forgeries . Baggett explains: “ There are a few reasons why it is a hard problem. One is that most of the work in computer vision has been done on three-dimensional photographic imagery. You know, take a picture and Inky is a cybersecurity company which claims to have developed the first email protection software to detect phishing attacks using computer vision, artificial intelligence, and machine learning. Dave Baggett, its Founder and CEO, elaborates on the different types of phishing attacks and the many challenges in developing this technology. 18 Application Computer Vision News Application Example of CEO Impersonation or Business Email Compromise

RkJQdWJsaXNoZXIy NTc3NzU=