CliqSafe – How Do We Do This?

CLIQSAFE: STAGE  1   Interrogates user email for all URLs   Packages them up in a small JSON call to CliqSafe Cloud through port 80 (or other port). May or may not require firewall rule changes on client-side.   Package is pre-parsed in CliqSafe Cloud against Client-generated whitelists, SEVERAL SIMPLE LOGICAL RULES, & Google Safe …

Phishing

THERE ARE 3 TYPES OF PHISHING EMAILS Stupid but Harmless: Examples of these…  Just today from the INBOX I’ve had since 1991 tango(at)1991.com: Penis Enlargement, Huge Savings…, Meet Local Singles!!, Fatty Liver Remedy, Car Security Systems!, Hips Locking Up?, Mold Removal, etc.    These are rarely harmful. Besides, if you are stupid enough to believe that a …

CliqSafe

The most common attack in a cyber-breach (the FBI has estimates this number to be as high as 80%) occurs when an unsuspecting user browses via email to a phishing or malware sight who’s address is obfuscated in some fashion. Most of us have been the victim of this type of attack. either knowingly or …