1
Aaron Higbee, Rohyt Belani, Scott Greaux: Simulated phishing attack with sequential messages. PhishMe, Fahmi Sellers Embert & Davitz, December 24, 2013: US08615807 (36 worldwide citation)

Described herein are methods, network devices and machine-readable storage media for conducting simulated phishing attacks on an individual so as to educate the individual about the various ways in which phishing attacks may be disguised. Specifically described is a simulated phishing attack involvi ...


2
Rohyt Belani, Aaron Higbee, Scott Greaux: Performance benchmarking for simulated phishing attacks. PhishMe, Fahmi Sellers Embert & Davitz, January 21, 2014: US08635703 (35 worldwide citation)

Described herein are methods, network devices and machine-readable media for conducting a simulated phishing attack on a first group of individuals, and performing an analysis of the group's performance to the simulated attack. In the analysis, an aggregate performance of the first group is compared ...


3
Aaron Higbee, Rohyt Belani, Scott Greaux: Collaborative phishing attack detection. Phishme, Ascenda Law Group PC, May 6, 2014: US08719940 (35 worldwide citation)

Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and ...


4
Rohyt Belani, Aaron Higbee, Scott Greaux: Methods and systems for preventing malicious use of phishing simulation records. PhishMe, Ascenda Law Group PC, December 9, 2014: US08910287 (30 worldwide citation)

Described herein are methods, network devices and machine-readable media for preventing the malicious use of phishing simulation records. Phishing simulation records often times can reveal which individuals are most susceptible to phishing attacks. In the event that an attacker gains access to these ...


5
Rohyt Belani, Aaron Higbee, Scott Greaux: Performance benchmarking for simulated phishing attacks. PhishMe, Ascenda Law Group PC, February 24, 2015: US08966637 (26 worldwide citation)

Described herein are methods, network devices and machine-readable media for conducting a simulated phishing attack on a first group of individuals, and performing an analysis of the group's performance to the simulated attack. In the analysis, an aggregate performance of the first group is compared ...


6
Aaron Higbee, Rohyt Belani, Scott Greaux: Collaborative phishing attack detection. PhishMe, CipherLaw, July 19, 2016: US09398038 (17 worldwide citation)

Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and ...


7
Rohyt Belani, Aaron Higbee, Scott Greaux: Methods and systems for preventing malicious use of phishing simulation records. PhishMe, CipherLaw, February 16, 2016: US09262629 (12 worldwide citation)

Described herein are methods, network devices and machine-readable media for preventing the malicious use of phishing simulation records. Phishing simulation records often times can reveal which individuals are most susceptible to phishing attacks. In the event that an attacker gains access to these ...


8
Aaron Higbee, Rohyt Belani, Scott Greaux: Collaborative phishing attack detection. PhishMe, CipherLaw, May 31, 2016: US09356948 (11 worldwide citation)

Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and ...


9
Aaron Higbee, Rohyt Belani, Scott Greaux: Collaborative phishing attack detection. PhishMe, CipherLaw, February 2, 2016: US09253207 (11 worldwide citation)

Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and ...


10
Aaron Higbee, Rohyt Belani, Scott Greaux: Collaborative phishing attack detection. PHISHME, CipherLaw, April 26, 2016: US09325730 (10 worldwide citation)

Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and ...