Our mission is making INBOX.CLEAN™ a reality: stop phishing attacks — the root cause of 95% of breaches — before they reach users. Get the only solution that preemptively stops Business Email Compromise, malware, ransomware and other advanced threats by discovering and eliminating them before they cause damage.
A cybersecurity analyst or engineer wakes up every morning, flips on their laptop, and defends others from attacks, responding at the speed of lightning to beat cyber villains, and with unmatched adaptability and agility stops cyber villains from getting into your inboxes and organizations – all while calling it just a normal day at the office.
Area 1’s cloud-native SaaS solution supports three key use cases: preemptive anti-phishing across all threat vectors (email, web, social, network); cloud email security / SEG replacement; and phishing security automation for SOC teams.
Area 1 is a Microsoft Certified Partner and a Google Cloud Security Technology Partner of the Year. We also integrate with a number of SIEM, SOAR, SEG and firewall technology providers to fit your unique infrastructure. Learn More
FIND A CHANNEL PARTNER
Work with trusted cybersecurity experts across the globe to secure your business. Learn about our partnerships with Legato Security, Optiv, SADA Systems, SYNNEX and others. Channel Partners Become A Channel Partner
It turns out the hardest thing in life to do is to pretend to be normal. Acting normal on the internet is even harder. Pretending to be something you’re not creates a trail of tiny patterns that can give you away. It’s a problem that no amount of sophistication or skill can solve.
Even the best hackers in the world, like organized criminals and nation states, are limited by a couple factors. First, they’re reliant on phishing, the root source of 95% of all breaches. Secondly, they need to appear authentic, which makes them predictable.
The worst attacks in hacker arsenal are what I will call the “pixel-perfect phish” — a near carbon copy of a real site. These sites are hackers trying to act normal, but they end up standing out like a guy wearing a trench coat and dark glasses in crowd if you know how to look for them.
I’m excited that our work in computer vision is breaking new ground and taking back control from attackers based on their behaviors not on the users actions. What we’ve recently figured out at Area 1 Security is that with computer vision, the harder you try to make a message look like it’s coming from someone else, the easier it is for a computer to spot. But to do it, you have to train a computer to “look” at emails and websites a little like a person does. The more a hacker acts normal, the more they stand out.
The pixel perfect phish plays on psychology. When you see a Wells Fargo login, unconsciously you might relax a little. After all, this is big, sophisticated bank and it’s earned a reputation for being secure. It’s no surprise that these attacks down some of the biggest targets. Hillary Clinton’s campaign manager fell for a password warning from GMail.
You may relax a little more if it’s an email addressed to your personal address, but personal accounts credentials are often the beachhead for corporate attacks.
These attacks are effective, easy and don’t require a lot research. But there’s a flipside to this. Every time a logo or a website appears to be something it’s not, that should be a simple red flag, right?
This is sort of what phishing education has been trying to do, but failing, for years. Telling people to mouse over domains and look for inconsistencies. But that advice is outdated. The web today is made of very complex urls, denoting servers, directories, and scripts. Add to that equation lookalike domains, and the proliferation of new domain extensions, and spotting “bad” urls has become an impossible task for people.
Cybersecurity professionals have been been asking more and more of their users at a time when most technology is asking less. It’s demanded everyone be part time a security professional. We’re about to give that job to a computer.
Enter computer vision. Thanks to some serious leaps in vector mapping, machine learning and natural language processing, we’re finally able to teach a computer to “see” like a person. Instead of sorting code and pixels as 1’s and 0’s, for the first time a computer can actually look for things.
By looking at a whole image, and finding lines and boundaries on objects like your brain does, computer scientists can make computers that can recognize faces, or figure out when a freeway lane merges. For the first time, pictures can be searched like data. Just like you might use a find function to look for a name in text, we can tell a computer to find images that are identical or close to other images.
Now our computer can look at websites and check that they are who they say they are. For instance, if our algorithm sees that a logo or a login on a page where the url doesn’t matchup, it can flag it, almost at the speed of light. If a page is setup to register credentials, but doesn’t send them to the right place, we can flag it. No matter how hard the bad guys pretend, they end up giving themselves away.
And the harder bad guys try to adapt, the easier it is for us to spot them.
Want to keep up to date with the latest phishing trends?
Dear America’s sports-loving, company-securing fans: Before you find yourself glued this weekend to (what some call) THE biggest game in college basketball history, we are here to crown the 2022 March Hackness winner!
https://www.area1security.com/wp-content/uploads/2022/03/Champion-Banner_2.png10002500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-03-31 06:00:292022-04-28 08:49:23Area 1 Security Announces the Most Spoofed Brand of 2021
Area 1 Security’s Sixth Annual March Hackness: The Perfect Phishing Bracket is here! Learn who made the list of the top brands that attackers use in phishing lures.
https://www.area1security.com/wp-content/uploads/2022/03/SocialBanner_Blog_MarchHackness2021_2500x1000-Copy-2.jpg10002500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-03-26 20:45:192022-04-28 08:51:272022 March Hackness: The Return of the Phishing Bracket
Since Area 1’s inception, our mission has always been to eliminate the #1 source of cybersecurity incidents — phishing attacks.
https://www.area1security.com/wp-content/uploads/2022/03/cloudflare_featured.png288512Shalabh Mohan & Patrick R. Donahue (Cloudflare)https://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngShalabh Mohan & Patrick R. Donahue (Cloudflare)2022-03-15 11:25:172022-04-28 09:19:06Democratizing email security: protecting individuals and businesses of all sizes from phishing and malware attacks