Google claims to block 99.9% of phishing attacks using machine learning
AI deployed to fight fraudsters

Google has deployed machine learning technology on its Gmail service that it claims can now block 99.9% of all phishing attempts it detects.
In a blog post, Andy Wen, senior product manager of counter abuse technology at Google, said machine learning had helped Gmail block spam and phishing messages from showing up in a user's inbox with over 99.9% accuracy.
"This is huge, given that 50-70% of messages that Gmail receives are spam," he said.
Wen explained that this dedicated machine learning model selectively delays messages (less than 0.05% of messages on average) to perform rigorous phishing analysis and further protect user data from compromise.
The detection models integrate with the machine learning supporting Safe Browsing, which is used to find and flag suspicious URLs.
"These new models combine a variety of techniques such as reputation and similarity analysis on URLs, allowing us to generate new URL click-time warnings for phishing and malware links," Wen said. "As we find new patterns, our models adapt more quickly than manual systems ever could, and get better with time."
Gmail users in the enterprise will also be warned when replying to someone outside of their company domain to prevent data loss.
"Now, if you try to respond to someone outside of your company domain, you'll receive a quick warning to make sure you intended to send that email. And because Gmail has contextual intelligence, it knows if the recipient is an existing contact or someone you interact with regularly, to avoid displaying warnings unnecessarily," said Wen.
Google has also introduced improvements that will scan messages for ransomware or polymorphic malware.
"We classify new threats by combining thousands of spam, malware and ransomware signals with attachment heuristics (emails that could be threats based on signals) and sender signatures (already marked malware)," Wen said.
The essential guide to cloud-based backup and disaster recovery
Support business continuity by building a holistic emergency plan
Download nowHow do vulnerabilities get into software?
90% of security incidents result from exploits against defects in software
Download nowDelivering the future of work - now
The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.
Download now