Personal Project 2:

Phishing Detection

I PREVENT.

Not every link is what it seems.
But Canary knows.
Keeps you safe before you click.

1

2

3

4

5

Lesson Learned

Key Insights

Hi-Fidelity Prototype

Lo-Fidelity Prototype

Brainstorm Solutions

Opportunity

Challenge

Initial Insights

Discovery

Research

Ideation

Prototype

Reflect

UX Process

Competitive Analysis

The Why

Hypothesis

DISCOVERY

What is a Phishing Detection Tool?

This tool is a browser extension that automatically scans links in real time using trusted sources to detect phishing links. It empowers non-technical users to browse safely without manually checking and secure sandbox options for risky links.

Initial Insights

During initial research, I realized that most phishing detection tools require users to manually check if a link is a phishing threat or not and that there is no secure environment for them to browse if they do choose to continue with these risky websites.

Hypothesis

What if we make the phishing detection tool more proactive instead of reactive, more users may be protected against phishing scam links or emails.

Understanding the Challenge and Opportunity

RESEARCH

Timeline

Nov 2024 - Feb 2025

The Opportunity

To design a phishing detection tool that automatically check links when the user is browsing and allow for an environment for safe browsing.

The Challenge

To help users protect themselves from social engineering attacks like phishing scams.

Tools

Figma & VS Code

Role & Responsibilities

Solo UX/UI Designer

Coder

Competitor Analysis

RESEARCH

I researched and compared Canary to a few phishing detection tools such as PhishTank and WoT (Web of Trust) to see how it can differentiate itself to these industry-standard tools.

Crowd-sourced database of phishing websites

PhishTank

Browser Extension that rates website safety

WoT (Web of Trust)

Strengths:

  • Crowdsourced database that updated frequently by a community of users

  • Trusted by several cybersecurity platforms as a phishing database

Weaknesses:

  • Manual checks

  • Interface may be too technical and not intuitive for non-experts.

Compared to Canary:

  • PhishTank is reliable for cross-referencing known phishing URLs but requires manual input which is inconvenient.

  • Canary automates the detection process and provides a sandbox environment to explore the links safely.

Strengths:

  • Real-Time warnings that passively monitors and flags unsafe websites

  • Easy to understand icons for safe, risky and dangerous websites

Weaknesses:

  • Primarily focuses on reputation by community rather than deep threat analysis.

Compared to Canary:

  • WoT provides safety ratings based on community input which can sometimes be inaccurate or biased.

  • Canary takes a more data-driven approach using phishing databases to automatically check links.

  • Canary's sandbox environment also offers a unique way to explore suspicious contents.

What I Propose…

IDEATION

By blending a combination of Tier-Based Status, Plain Language Alerts, and a Community Awareness Dashboard, Canary aims to make security more easier to understand and foster a sense of responsibility within residential buildings

An environment for users to continue browsing the suspicious link that will not affect their network.

Sandbox Environment

No more inconvenience of manually checking potentially dangerous URLs

Automatic Phishing Checks

"Solution 2"

"Solution 1"

PROTOTYPE

Lo-Fidelity Prototype

Hi-Fidelity Prototype

Looking Back…

REFLECT

Key Insights & Wins:

Lesson Learned:

  • Taking on the entire design process solo taught me the importance of staying organized, adapting quickly, and prioritizing tasks in order to maintain progress.


  • Since it is a conceptual project, I learned that leveraging AI tools to help with research can boost inspiration and efficiency to streamline my UX process


  • I learned that having a sandbox environment, while difficult to implement, is one of the best ways to ensure that non-technical users do not fall victim and do not accidentally let malicious actors into their networks.

  • I took on the challenge of designing all of Canary features on my own, from start to finish. It was a lot to handle but it pushed me to think creatively and stay organized.


  • Diving into the security market was a new experience, but I quickly figured out where the gaps were and how to address them through design.


  • I prioritized real-time detection without disrupting user's browsing experience, keep alerts clear and actionable.