Advanced processing of electronic messages with attachments in a cybersecurity system
First Claim
1. A system for managing computer security risks associated with message file attachments in a cybersecurity network, the system comprising:
- a client computing device comprising;
a processing device,a user interface,a messaging client configured to cause the client computing device to receive electronic messages and present the electronic messages to a user on a display device,a computer-readable medium portion storing programming instructions that are configured to cause the client computing device to;
receive an electronic message at the messaging client;
receive, via the user interface, an indication that a user has attempted to actuate an attachment to the electronic message that the messaging client has received; and
prevent the attachment from actuating on the client computing device until the system determines whether the received message is a legitimate message or a potentially malicious message; and
a computer-readable medium portion storing programming instructions that are configured to cause the client computing device or a remote computing device to;
determine whether the received message is a legitimate message or a potentially malicious message without processing the attachment,if the determining determines that the received message is a legitimate message, permit the attachment to actuate on the client computing device, andif the determining determines that the received message is not or may not be a legitimate message, continue preventing the attachment from actuating on the client computing device.
5 Assignments
0 Petitions
Accused Products
Abstract
A system manages computer security risks associated with message file attachments. When a user of an electronic device with a messaging client attempts to open an attachment to a message that is in the client'"'"'s inbox, the system will analyze the message to determine whether the message is a legitimate message or a potentially malicious message without the need to actually process or analyze the attachment itself. If the system determines that the received message is a legitimate message, the system will permit the attachment to actuate on the client computing device. If the system determines that the received message is not or may not be a legitimate message, the system will continue preventing the attachment from actuating on the client computing device.
201 Citations
22 Claims
-
1. A system for managing computer security risks associated with message file attachments in a cybersecurity network, the system comprising:
-
a client computing device comprising; a processing device, a user interface, a messaging client configured to cause the client computing device to receive electronic messages and present the electronic messages to a user on a display device, a computer-readable medium portion storing programming instructions that are configured to cause the client computing device to; receive an electronic message at the messaging client; receive, via the user interface, an indication that a user has attempted to actuate an attachment to the electronic message that the messaging client has received; and prevent the attachment from actuating on the client computing device until the system determines whether the received message is a legitimate message or a potentially malicious message; and a computer-readable medium portion storing programming instructions that are configured to cause the client computing device or a remote computing device to; determine whether the received message is a legitimate message or a potentially malicious message without processing the attachment, if the determining determines that the received message is a legitimate message, permit the attachment to actuate on the client computing device, and if the determining determines that the received message is not or may not be a legitimate message, continue preventing the attachment from actuating on the client computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of managing computer security risks associated with message file attachments in a cybersecurity network, the method comprising:
-
by a client computing device comprising a processing device and a user interface, executing programming instructions configured to cause the client computing device to; receive, by a messaging client application of the client computing device, an electronic message, receive, via the user interface, an indication that a user has attempted to actuate an attachment to the electronic message that a messaging client application of the client computing device has received, prevent the attachment from actuating until the client computing device determines whether the received message is a legitimate message or a potentially malicious message, without processing the attachment, determine whether the received message is a legitimate message or a potentially malicious message, if the determining determines that the received message is a legitimate message, permit the attachment to actuate on the client computing device, and if the determining determines that the received message is not or may not be a legitimate message, continue to prevent the attachment from actuating on the client computing device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification