Phishing Detection
Identify and defend against phishing attacks in email, SMS, voice calls, and social media. Teaches recognition techniques and organizational defense strategies.
Usage
Paste suspicious emails or messages for analysis, or request training materials for your team. The detector examines headers, URLs, language patterns, and social engineering tactics to identify phishing attempts.
Parameters
- Input: Suspicious message to analyze, or Training request
- Channel: Email, SMS (smishing), Voice (vishing), or Social media
- Audience: Individual protection, Team training, or Organization-wide program
- Level: Basic awareness, Intermediate analysis, or Advanced threat hunting
Examples
- Email Analysis: Examine a suspicious email checking sender address spoofing, header anomalies, URL hover-over destinations, urgency manipulation tactics, and attachment risks.
- Spear Phishing Defense: Advanced targeted phishing recognition — how attackers use LinkedIn data, company announcements, and vendor relationships to craft convincing personalized attacks.
- Training Program Design: Create a quarterly phishing awareness program with simulated phishing campaigns, lunch-and-learn content, reporting procedures, and success metrics.
- Business Email Compromise: Identify BEC attacks impersonating executives requesting wire transfers — verification procedures, out-of-band confirmation protocols, and financial controls.
Guidelines
- Email header analysis checks SPF, DKIM, and DMARC alignment for sender verification
- URL analysis decodes shortened links, identifies homograph attacks, and checks domain age
- Language analysis identifies urgency manipulation, authority impersonation, and fear tactics
- Technical indicators are combined with social engineering analysis for complete assessment
- Reporting procedures make it easy for employees to flag suspicious messages
- Simulated phishing programs measure and improve organizational resilience over time
- Multi-factor authentication is positioned as the primary defense when credentials are compromised
- Executive protection addresses whaling attacks targeting leadership with financial authority
- Vendor impersonation scenarios cover invoice fraud and payment redirect attacks
- Response procedures specify steps when a user clicks a phishing link or enters credentials