Microsoft reaches out for new anti-phishing program

By

Microsoft’s upcoming anti-phishing program will be a collaboration among the Redmond, Wash.,-based company and three outside partners.

Cyota, MarkMonitor and Internet Identity have all teamed with the computer giant to create Microsoft Phishing Filter.


The program will be available as part of the upcoming Internet Explorer 7, which will warn users and restrict access to confirmed phishing sites, the companies said last week. The Phishing Filter data will also be used to protect users of MSN Hotmail and Windows Live Mail beta users.

Amir Orad, executive vice president at Cyota, said in a statement that financial institutions are one group that will benefit from the improvement.

"We strongly believe that a multi-layered approach is the best way to help protect Internet users from online financial fraud," he said.

"That's why Cyota has collaborated with leading technology companies such as Microsoft to create a strong first line of defense, in addition to strong authentication solutions that better detect, prevent and defend against online fraud at the specific institutional level."

The anti-phishing offering will increase the safety level of the internet, said Mark Shull, chief executive officer of MarkMonitor.

"We believe Microsoft's new offerings represent a major step forward in providing anti-phishing protection for our corporate customers as well as Microsoft's end users, and furthers our mutual goal of making the internet safe for conducting business," he said.

The service will also be available for users of Windows XP with Service Pack 2 and Windows Vista. Rod Rasmussen, director of operations for Internet Identity, called the partnership "a huge win for our customers."

"With its reach, the Microsoft Phishing Filter will help provide the definitive method to quickly render phishing sites ineffective," he said.

www.microsoft.com
www.cyota.com
www.markmonitor.com
www.internetidentity.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Accenture to buy Australian cyber security firm CyberCX

Accenture to buy Australian cyber security firm CyberCX

TPG Telecom reveals iiNet order management system breached

TPG Telecom reveals iiNet order management system breached

"Shade BIOS" stealth malware hides below operating system

"Shade BIOS" stealth malware hides below operating system

Log In

  |  Forgot your password?