Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    IBM Applies Cognitive Insights to Reduce Phishing Risks

    By
    Sean Michael Kerner
    -
    March 27, 2017
    Share
    Facebook
    Twitter
    Linkedin
      Phishing attacks

      IBM has been talking a lot lately about its cognitive capabilities, often in the context of the cloud and usually in reference to the company’s Watson platform.

      IBM today announced a new cognitive technology that aims to help reduce the risk of phishing. The new cognitive phishing capability however is not directly related to IBM Watson.

      “Cognitive phishing detection is an enhancement to our existing phishing detection capability in IBM Trusteer Rapport,” Eileen Turner, Program Director, Portfolio Marketing, IBM Trusteer, told eWEEK.

      IBM acquired security vendor Trusteer back in September 2013 and has been steadily helping to develop the company’s security capabilities ever since. Turner explained that Trusteer had previously been using an approach that included a level of manual analysis by the Trusteer security research team, analyzing suspicious URLs for phishing attacks.

      “With this new capability, we are now able to extend their research and automate the detection and protection process, increasing the speed and scale of detection,” Turner said.

      The cognitive phishing capability is not a new product, but rather is an enhanced capability that is now part of the IBM Trusteer Rapport offering. Trusteer Rapport is a Software-as-a-Service application that provides a client agent that is installed on endpoints. The Rapport service helps to detect and prevent financial malware and phishing attacks.

      Turner noted that the intelligence that IBM gathers from Trusteer Rapport can also help users who do not have the Rapport agent, but are protected with the IBM Trusteer Pinpoint Detect service that is designed to help defend online banking sites from attacks.

      As opposed to many of IBM’s other cognitive computing efforts, the new phishing capability does not make use of the IBM Watson cognitive computing platform.

      “With this new capability, we are leveraging a cognitive approach using machine learning and advanced analytics to transform phishing detection and protection,” Turner said. “We are evaluating the future use of Watson in this space.”

      Though IBM is not using Watson for the cognitive phishing service, Watson is already playing an active role in IBM’s overall security portfolio. In February 2017, IBM announced its Cognitive Security Operations initiative which is powered in part by Watson.

      Rather than using Watson, Turner explained that the new cognitive phishing capabilities make use of patented machine learning technologies developed in partnership with IBM Trusteer research and IBM Cyber Security Center of Excellence in Ben-Gurion University, Israel.

      “It uses machine learning and advanced algorithms to learn and understand various components of the phishing attacks,” Turner said.

      Turner explained that the new machine learning is used to analyze webpage content—including links, images, forms, text, scripts, URLs and more, to determine if a address is a malicious site.  She added that the cognitive phishing capability enables IBM Trusteer to automatically understand the attack characteristics, detecting when fraudsters change their techniques with IBM continuously adapting protections in response.

      Phishing attacks are blocked by the Trusteer Rapport agent that is installed on endpoint devices. Turner said that the agent continuously receives updates of confirmed phishing sites from the Trusteer cloud, and when the user attempts to access these URLs, the user will be warned or even redirected automatically.

      While the new cognitive phishing capability is all about limiting the risk of malware, it can also potentially have an impact on helping to lower the risk of Business Email Compromise (BEC) attacks as well. BEC attacks are a growing concern for organizations of all sizes and just last week the U.S Department of Justice charged an individual with allegedly stealing $100 million from two U.S companies as part of a BEC fraud scheme.

      “Business email compromise is a social-engineering attack by design that in many cases does not involve any means for credentials compromise, like malware or phishing,” Turner said. “However, our research shows the same gangs are operating both methodologies, and in many cases use financial malware for reconnaissance of the targets.”

      “Thus, having Trusteer Rapport installed and remediating the financial malware can help reduce the chance of being targeted by BEC,” she added.

      Avatar
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×