Patents Assigned to PhishMe, Inc.
-
Patent number: 9906554Abstract: The present invention relates to methods, network devices, and machine-readable media for an integrated environment for automated processing of reports of suspicious messages, and furthermore, to a network for distributing information about detected phishing attacks.Type: GrantFiled: May 1, 2017Date of Patent: February 27, 2018Assignee: PhishMe, Inc.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux, William Galway, Douglas Hagen
-
Patent number: 9906539Abstract: The present invention relates to methods, network devices, and machine-readable media for an integrated environment for automated processing of reports of suspicious messages, and furthermore, to a network for distributing information about detected phishing attacks.Type: GrantFiled: December 31, 2015Date of Patent: February 27, 2018Assignee: PhishMe, Inc.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux, William Galway, Douglas Hagen
-
Publication number: 20170237776Abstract: The present invention relates to methods, network devices, and machine-readable media for an integrated environment for automated processing of reports of suspicious messages, and furthermore, to a network for distributing information about detected phishing attacks.Type: ApplicationFiled: May 1, 2017Publication date: August 17, 2017Applicant: PhishMe, Inc.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux, William Galway, Douglas Hagen
-
Patent number: 9674221Abstract: Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and/or may provide a numerical ranking indicating the likelihood that the message is a possible phishing attack. As responses from different individuals may have a different degree of reliability, each response from an individual may be weighted with a corresponding trustworthiness level of that individual, in an overall determination as to whether a message is a phishing attack. A trustworthiness level of an individual may indicate a degree to which the response of that individual can be trusted and/or relied upon, and may be determined by how well that individual recognized simulated phishing attacks.Type: GrantFiled: January 28, 2017Date of Patent: June 6, 2017Assignee: PhishMe, Inc.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux
-
Patent number: 9667645Abstract: Described herein are methods, network devices and machine-readable media for conducting a simulated phishing attack on a first group of individuals, and performing an analysis of the group's performance to the simulated attack. In the analysis, an aggregate performance of the first group is compared with an aggregate performance of individuals from a second group. To ensure uniformity in the simulated phishing attacks, messages thereof may be constructed from template messages, the template messages having placeholders for individual-specific and company-specific information.Type: GrantFiled: January 25, 2016Date of Patent: May 30, 2017Assignee: PhishMe, Inc.Inventors: Rohyt Belani, Aaron Higbee, Scott Greaux
-
Patent number: 9591017Abstract: Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and/or may provide a numerical ranking indicating the likelihood that the message is a possible phishing attack. As responses from different individuals may have a different degree of reliability, each response from an individual may be weighted with a corresponding trustworthiness level of that individual, in an overall determination as to whether a message is a phishing attack. A trustworthiness level of an individual may indicate a degree to which the response of that individual can be trusted and/or relied upon, and may be determined by how well that individual recognized simulated phishing attacks.Type: GrantFiled: April 25, 2016Date of Patent: March 7, 2017Assignee: PhishMe, Inc.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux
-
Publication number: 20160301705Abstract: The present invention relates to methods, network devices, and machine-readable media for an integrated environment for automated processing of reports of suspicious messages, and furthermore, to a network for distributing information about detected phishing attacks.Type: ApplicationFiled: December 31, 2015Publication date: October 13, 2016Applicant: PhishMe, Inc.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux, William Galway, Douglas Hagen
-
Patent number: 9398038Abstract: Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and/or may provide a numerical ranking indicating the likelihood that the message is a possible phishing attack. As responses from different individuals may have a different degree of reliability, each response from an individual may be weighted with a corresponding trustworthiness level of that individual, in an overall determination as to whether a message is a phishing attack. A trustworthiness level of an individual may indicate a degree to which the response of that individual can be trusted and/or relied upon, and may be determined by how well that individual recognized simulated phishing attacks.Type: GrantFiled: June 14, 2013Date of Patent: July 19, 2016Assignee: PhishMe, Inc.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux
-
Publication number: 20160164898Abstract: Described herein are methods, network devices and machine-readable media for preventing the malicious use of phishing simulation records. A phishing simulation record of an individual is associated with an e-mail alias of the individual. Further, such e-mail alias may be deactivated after phishing simulations have been completed. Therefore, even if an attacker were able to identify individuals most susceptible to phishing attacks, the attacker will be unable to send any phishing attacks to those individuals since their e-mail aliases will have been deactivated.Type: ApplicationFiled: February 15, 2016Publication date: June 9, 2016Applicant: PhishMe, Inc.Inventors: Rohyt Belani, Aaron Higbee, Scott Greaux
-
Patent number: 9356948Abstract: Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and/or may provide a numerical ranking indicating the likelihood that the message is a possible phishing attack. As responses from different individuals may have a different degree of reliability, each response from an individual may be weighted with a corresponding trustworthiness level of that individual, in an overall determination as to whether a message is a phishing attack. A trustworthiness level of an individual may indicate a degree to which the response of that individual can be trusted and/or relied upon, and may be determined by how well that individual recognized simulated phishing attacks.Type: GrantFiled: August 2, 2013Date of Patent: May 31, 2016Assignee: PhishMe, Inc.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux
-
Patent number: 9325730Abstract: Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and/or may provide a numerical ranking indicating the likelihood that the message is a possible phishing attack. As responses from different individuals may have a different degree of reliability, each response from an individual may be weighted with a corresponding trustworthiness level of that individual, in an overall determination as to whether a message is a phishing attack. A trustworthiness level of an individual may indicate a degree to which the response of that individual can be trusted and/or relied upon, and may be determined by how well that individual recognized simulated phishing attacks.Type: GrantFiled: February 12, 2015Date of Patent: April 26, 2016Assignee: PHISHME, INC.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux
-
Patent number: 9262629Abstract: Described herein are methods, network devices and machine-readable media for preventing the malicious use of phishing simulation records. Phishing simulation records often times can reveal which individuals are most susceptible to phishing attacks. In the event that an attacker gains access to these records, the attacker can exploit such information to send phishing attacks to those individuals who are the most susceptible. To address such vulnerabilities, a phishing simulation record of an individual is only associated with an e-mail alias of the individual. Further, such e-mail alias may be deactivated after phishing simulations have been completed. Therefore, even if an attacker were able to identify individuals most susceptible to phishing attacks, the attacker will be unable to send any phishing attacks to those individuals since their e-mail aliases will have been deactivated.Type: GrantFiled: January 21, 2014Date of Patent: February 16, 2016Assignee: PhishMe, Inc.Inventors: Rohyt Belani, Aaron Higbee, Scott Greaux
-
Patent number: 9253207Abstract: Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and/or may provide a numerical ranking indicating the likelihood that the message is a possible phishing attack. As responses from different individuals may have a different degree of reliability, each response from an individual may be weighted with a corresponding trustworthiness level of that individual, in an overall determination as to whether a message is a phishing attack. A trustworthiness level of an individual may indicate a degree to which the response of that individual can be trusted and/or relied upon, and may be determined by how well that individual recognized simulated phishing attacks.Type: GrantFiled: February 8, 2013Date of Patent: February 2, 2016Assignee: PhishMe, Inc.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux
-
Patent number: 9246936Abstract: Described herein are methods, network devices and machine-readable media for conducting a simulated phishing attack on a first group of individuals, and performing an analysis of the group's performance to the simulated attack. In the analysis, an aggregate performance of the first group is compared with an aggregate performance of individuals from a second group. Standardizing the simulated phishing attacks for individuals from both the first and second groups is necessary in order for the performance of the first group to be fairly or meaningfully compared to the performance of the second group. To ensure uniformity in the simulated phishing attacks, messages thereof may be constructed from template messages, the template messages having placeholders for individual-specific and company-specific information.Type: GrantFiled: February 24, 2015Date of Patent: January 26, 2016Assignee: PhishMe, Inc.Inventors: Rohyt Belani, Aaron Higbee, Scott Greaux
-
Publication number: 20150205953Abstract: Described herein are methods, network devices and machine-readable media for preventing the malicious use of phishing simulation records. Phishing simulation records often times can reveal which individuals are most susceptible to phishing attacks. In the event that an attacker gains access to these records, the attacker can exploit such information to send phishing attacks to those individuals who are the most susceptible. To address such vulnerabilities, a phishing simulation record of an individual is only associated with an e-mail alias of the individual. Further, such e-mail alias may be deactivated after phishing simulations have been completed. Therefore, even if an attacker were able to identify individuals most susceptible to phishing attacks, the attacker will be unable to send any phishing attacks to those individuals since their e-mail aliases will have been deactivated.Type: ApplicationFiled: January 21, 2014Publication date: July 23, 2015Applicant: PhishMe, Inc.Inventors: Rohyt Belani, Aaron Higbee, Scott Greaux
-
Publication number: 20150180896Abstract: Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and/or may provide a numerical ranking indicating the likelihood that the message is a possible phishing attack. As responses from different individuals may have a different degree of reliability, each response from an individual may be weighted with a corresponding trustworthiness level of that individual, in an overall determination as to whether a message is a phishing attack. A trustworthiness level of an individual may indicate a degree to which the response of that individual can be trusted and/or relied upon, and may be determined by how well that individual recognized simulated phishing attacks.Type: ApplicationFiled: February 12, 2015Publication date: June 25, 2015Applicant: PHISHME, INC.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux
-
Patent number: 9053326Abstract: Described herein are methods, network devices and machine-readable storage media for conducting simulated phishing attacks on an individual so as to educate the individual about the various ways in which phishing attacks may be disguised. Specifically described is a simulated phishing attack involving a sequence of messages. At least one of the messages has an associated target action that would ordinary, if the attack were an actual phishing attack, result in the individual's personal information and/or computing device becoming compromised. In the simulated phishing attack, no malicious action is actually performed. At least one of the other messages is designed to draw attention to the message with the target action.Type: GrantFiled: February 8, 2013Date of Patent: June 9, 2015Assignee: PhishMe, Inc.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux
-
Patent number: 8966637Abstract: Described herein are methods, network devices and machine-readable media for conducting a simulated phishing attack on a first group of individuals, and performing an analysis of the group's performance to the simulated attack. In the analysis, an aggregate performance of the first group is compared with an aggregate performance of individuals from a second group. Standardizing the simulated phishing attacks for individuals from both the first and second groups is necessary in order for the performance of the first group to be fairly or meaningfully compared to the performance of the second group. To ensure uniformity in the simulated phishing attacks, messages thereof may be constructed from template messages, the template messages having placeholders for individual-specific and company-specific information.Type: GrantFiled: February 8, 2013Date of Patent: February 24, 2015Assignee: PhishMe, Inc.Inventors: Rohyt Belani, Aaron Higbee, Scott Greaux
-
Patent number: 8910287Abstract: Described herein are methods, network devices and machine-readable media for preventing the malicious use of phishing simulation records. Phishing simulation records often times can reveal which individuals are most susceptible to phishing attacks. In the event that an attacker gains access to these records, the attacker can exploit such information to send phishing attacks to those individuals who are the most susceptible. To address such vulnerabilities, a phishing simulation record of an individual is only associated with an e-mail alias of the individual. Further, such e-mail alias may be deactivated after phishing simulations have been completed. Therefore, even if an attacker were able to identify individuals most susceptible to phishing attacks, the attacker will be unable to send any phishing attacks to those individuals since their e-mail aliases will have been deactivated.Type: GrantFiled: March 24, 2014Date of Patent: December 9, 2014Assignee: PhishMe, Inc.Inventors: Rohyt Belani, Aaron Higbee, Scott Greaux
-
Publication number: 20140230061Abstract: Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and/or may provide a numerical ranking indicating the likelihood that the message is a possible phishing attack. As responses from different individuals may have a different degree of reliability, each response from an individual may be weighted with a corresponding trustworthiness level of that individual, in an overall determination as to whether a message is a phishing attack. A trustworthiness level of an individual may indicate a degree to which the response of that individual can be trusted and/or relied upon, and may be determined by how well that individual recognized simulated phishing attacks.Type: ApplicationFiled: August 2, 2013Publication date: August 14, 2014Applicant: PhishMe, Inc.Inventors: Aaron Higbee, Rohyt Belani, Scott Greaux