Online Advertising: The Good, The Bad, and The Ugly

Size: px
Start display at page:

Download "Online Advertising: The Good, The Bad, and The Ugly"

Transcription

1 Online Advertising: The Good, The Bad, and The Ugly Yi-Min Wang Group Manager & Principal Researcher Cybersecurity & Systems Management Group Microsoft Research, Redmond

2 The Traffic-to-Money Converter & The STC Generation The Traffic-to-Money Converter Traffic Traffic-to-Money Converter Money STC = Search, Type, and Click The STC generation collectively generates a lot of web traffic Traffic-to-money converter for the web Mass-market ads syndication programs Mass-market exploit affiliate programs

3 The STC Traffic The Good Search Type Click Search Ads Search Engine Typo Domain Ads-Portal Page Mass-Market Advertisement Syndication Program #1 Spam Ads-Portal Page The Ugly Advertisement Syndication or Exploit Affiliate Programs Ads by G/Y/M Non-Merchants Hacked Ads Merchants Spyware Vendors Target web pages The Bad

4 Web Analytics & Advertising Syndication The Good Mass-Market Advertisement Syndication Program #1 Ads by G/Y/M Non-Merchants Merchants Target web pages

5 <img alt="" border="0" name="dcsimg" width="1" height="1" src=" dcsuri=/nojavascript&wt.js=no"/>

6 Where s The Bug? 1x1 transparent-gif web bug magnified

7 Web Bug

8

9

10 Web Analytics: Example #1 Primary URL on Primary Domain Show nothing Secondary URL on Third-Party Domain statse.webtrendslive.com/.../dcs.gif Primary URL

11 Web Analytics: Example #2 Primary URL: Secondary URL on Third-Party Domain ssl.google-analytics.com/urchin.js google-analytics.com/ utm.gif Primary URL

12 Secondary URL on Third-Party Domain ssl.google-analytics.com/urchin.js google-analytics.com/ utm.gif Primary URL

13 Advertising Syndication Primary URL: Show small ads Secondary URL on Third-Party Domain pagead2.googlesyndication.com /pagead/show_ads.js Primary URL Before ads are displayed; even without clicking any ads

14 Potential Security and Privacy Concerns Scripts executed without user permission Redirection to third-party domains happened without user knowledge Not all URLs get recorded in browser history Don t know what, when, and why Many consumer machines have fixed IP addresses Like car license plate number for information highway Corporate proxy IP addresses necessarily identify the company Like company logo on company vans Redirected-to third-party domains can set cookies Can ID <IP address, account> pair

15 Coverage of Top One Million URLs Traffic Cameras for the Information Highway One camera in every 8 th street corner 14.0% 12.0% 10.0% 8.0% 6.0% 4.0% 2.0% 0.0% 13.0% Googlesyndication.com Doubleclick.net 3.7% 3.0% 1.8% 1.4% 1.1% 1.0% 1.0% Atdmt.com Fastclick.net Amazon.com Advertising.com Casalemedia.com Overture.com Top Syndication Servers

16 Domain Parking & Typo-squatting Type Typo Domain Ads-Portal Page The Ugly Advertisement Syndication or Non-Merchants Merchants Target web pages

17 Domain Parking Primary URL: Show full-page ads Zero content Secondary URL on Third-Party Domain apps5.oingo.com/apps/domainp ark/domainpark.cgi Primary URL

18 It used to be much uglier (oingo.com)

19 DomainSponsor.com

20 Internet Real Estate Business Rule of thumb: every unique visitor is worth 5 cents on average $7.00 / 365 / $0.05 = 0.38 unique visitors/ day How to attract traffic: Generic name domains Sex.com ($12 million), Diamond.com ($7.5 million), Business.com ($7.5 million in 1999), Sweatpants.com ($8,500) Typo-squatting domains Trademark domains

21 When typo of slashdot got slashdotted

22 Strider Typo-Patrol Typo generation algorithm Missing-dot typos wwwsouthwest.com Character-omission typos MarthStewart.com Character-permutation typos NYTiems.com Character-replacement typos DidneyWorld.com Character-insertion typos WashingtonPoost.com

23 % of 2,233 Active Typos Top Typo-squatting Domain Parking Servers 20% 18% 16% 14% 12% 10% 8% 6% 4% 2% 0% 19% 14% 3.30% 3.30% 3.10% 2.20% Oingo.com Domainsponsor.com Sedoparking.com Qsrch.com Hitfarm.com Top Domain Parking Servers Netster.com

24 Strider URL Tracer with Typo-Patrol Overall, one in every four active typo domains was parked with oingo.com One in every six active typo domains was owned by Unasi/Domaincar

25 For More Information The Web's Million-Dollar Typos Strider Typo-Patrol Strider Typo-Patrol SRUTI Usenix SRUTI 06 workshop

26 Search Search Spam Search Engine Spam Ads-Portal Page The Ugly Advertisement Syndication Non-Merchants Merchants Target web pages

27 Google search coach handbag

28 Spam Doorway: topsearch10.com

29 Content

30 Links

31 Redirection Spam Primary URL: Redirect to full-page ads; cloaking Secondary URL on Third-Party Domain arch.php?aid= Primary URL

32 Spam Detection Content-based approach Information retrieval-based ranking Applied to too many fake pages that are never shown to any users (i.e., cloaking) Behavior-based approach Strider SearchMonkeys: mimicking human browsing in full fidelity Comment-spam hunting, cloaking detection, tracking redirection to known-spammer domain, etc. Turn search spam problem into system security problem

33 Strider Search Ranger System Primary- URL page Search engines Spammed forums 1 Spam suspects URLs Third-party domain page Strider URL Tracer Search Monkeys running actual browsers Spam Hunters 4 Third-party domain page Known-bad signatures Known- Bad URLs 2 Redirection report Redirection Spam Analyzer Unclassified URLs grouped & ranked by redirection domains Confirmed spam URLs & redirection domains Spam Verifier 3

34 Per-Category Spam Percentage Spammer-Targeted Categories Density DCG/Max 35% 30% 25% 20% 15% 10% 5% 0% 30.8% 14.2% 8.9% 27.5% 2.7% 7.6% 7.8% 3.3% 3.9% 9.7% 11.6% Drugs Adult Gambling Ringtone Money Accessories Travel Cars Furniture Music Average Spammer-targeted Categories

35 # of Spam Appearance Top Spam Doorway Domains 3, blogspot.com 493 netscape.com 396 hometown.aol.com hometown.aol.de oas.org xoomer.alice.it home.aol.com freewebs.com blogstudio.com maxpages.com usaid.gov blogsharing.com sitegtr.com forospace.com blog.hlx.com

36 % URLs Detected as Spam Spam Percentages At least 3 out of 4 were spam! 100% 80% 60% 40% 20% 0% 77% 74% 84% 91% 95% 99% 78% 77% 52% blogspot.com netscape.com hometown.aol.com hometown.aol.de oas.org xoomer.alice.it home.aol.com freewebs.com blogstudio.com maxpages.com 81% 85% 93% 100% 95% 100% usaid.gov blogsharing.com sitegtr.com forospace.com blog.hlx.com

37 # of Spam Appearances Top.gov/.edu Doorway Domains usaid.gov mit.edu gatech.edu ucsd.edu tsmu.edu cudenver.edu uconn.edu evansville.edu harvard.edu virginia.edu apu.edu neu.edu dot.gov uchicago.edu washington.edu

38 Universal Redirectors rds.yahoo.com/_ylt=/* store.adobe.com/cgi-bin/redirect/n=14630? _DisclaimerKids_prod.cfm?link_out= ino ctrocbas serifos.eecs.harvard.edu/proxy/

39 # of Spam Appearances Top Redirection Domains paysefeed.net topmeds10.com topsearch10.com 879 themp3direct.com searchadv.com sixxx.info topmobile10.com rightfinder.net vip-online-search.info a3b4.info yourfastfind.org arearate.com find-more.biz yourfreevids.com webresourses.info

40 Malicious Websites Search Type Search Engine Typo Domain Ads-Portal Page Spam Ads-Portal Page Exploit Affiliate Programs Non-Merchants Hacked Ads Merchants Spyware Vendors Target web pages The Bad

41 Google search pain killer

42 Malicious Spam Primary URL: www. blogigo. de/ pain_killer Vulnerability exploits; Sometimes window closed Secondary URL on Third-Party Domain biopharmasite. info/ directory.php Primary URL

43

44

45

46 Exploit failed Click here to install

47 TheRegister.com Malicious Banner

48 MySpace.com Malicious Banner

49 Where Did This Come From?

50 Honeypot versus HoneyMonkey Malicious or Hacked Client Takedown Malicious or Hacked Web Server Malicious Network Packets IDS Firewall Server Process Server-Side Vulnerability Server Process Honeypot Malicious HTTP Response Browser Client-Side Vulnerability HTTP Request Blacklist Browser Honey Monkey = Spider Crawler

51 HoneyMonkey Blackbox Exploit Detection Other Content Provider Content Provider Obfuscated Java Scripts Browser Sandbox URL Tracer Third-Party URLs Malicious Scripts Exploit Provider FDR Virtual Machine Malware Installation

52 Density of Malicious Websites Suspicious List Popular List # URLs scanned 16,190 1,000,000 # Exploit URLs 207 (1.28%) 710 (0.071%) # Exploit URLs After Redirection (Expansion Factor) 752 (263%) 1,036 (46%) # Exploit Sites SP2-to-SP1 Ratio 204/688 = /980 = 0.13

53 Infection Rate Heavily Depends on Patch Level (May~June 2005) # Exploit URLs # Exploit Sites Total WinXP SP1-UP (UP=UnPatched) WinXP SP2-UP WinXP SP2-PP (PP=Partially Patched) WinXP SP2-FP (FP=Fully Patched)

54 Number of hosted exploit URLs Site Ranking by Number of Hosted Exploit URLs toolbarpartner.com.edu: hacked course bulletin board Site ranking based on the number of hosted exploit URLs

55 Exploit Pages Organized by Account Names /adverts Pretend to be an Advertisement Syndicator /romas /west /0MhNSYF E /x-web /index.html /index2.html /page1.htm /index.html /index2.html /page1.htm /index.html /index2.html /page1.htm /index.html /index2.html /page1.htm

56 Zero-Day Exploit Detection Vulnerabilities exploited before patch was released Used to be an ad-hoc & manual process that relied heavily on external finders HoneyMonkey turned it into a systematic & automatic process that allows Microsoft to lead the battle HoneyMonkey running on fully patched WinXP SP2 VM constantly scanning the 752 exploit URLs The Javaprxy.dll zero day Early July, 2005: detected the first zero-day exploit URL within 2.5 hours of scanning confirmed to be the first in-the-wild exploit URL reported to MSRC 26 of the 752 URLs upgraded to the javaprxy exploit 25 of them generated third-party URLs to an unknown exploit provider site: hxxp:// /[8 random chars]/test2/iejp.htm Takedown notices sent most, but not all, of the 25 URLs stopped exploiting javaprxy

57 Observations Monitoring easy-to-find exploit URLs is effective Zero-day exploits need to connect to popular pages Monitoring content providers with well-known URLs is effective (because they cannot move) Exploit providers can move and randomize URLs Monitoring highly ranked and advanced exploit URLs is effective First detected zero-day exploit URL belongs to the #9 site 7 of the top 10 sites upgraded (by connection counts) Nearly half of the SP2-PP exploit URLs upgraded

58 HoneyMonkey Anti-Exploit Process Top O(10 8 ) URLs (ranked by click-through counts, etc.) SPIM URLs Search Engine Crawler SPAM URLs O(10 10 ) pages on the Web Spam URLs from Strider Search Ranger HoneyMonkey Network of O(10 2 ) PCs running unpatched VMs O(10 4 ) exploit URLs HoneyMonkey Network of O(10 1 ) PCs running partially- or fully-patched VMs O(10 1 ) zero-day exploit URLs Browser Blocking Search Result Blocking Corporate Proxy Blocking ISP Blocking Anti-Spyware & Anti-Virus Security Response Center Legal Takedown

59 Summary A common redirection-based framework for analyzing: Web Bugs Advertising Syndication Typo-squatting Redirection Spam Malicious websites Automated web patrol with Strider monkeys Analyzing individual web pages with known-bad signatures Analyzing groups of web pages to discover new signatures

Spam Double-Funnel: Connecting Web Spammers with Advertisers

Spam Double-Funnel: Connecting Web Spammers with Advertisers Spam Double-Funnel: Connecting Web Spammers with Advertisers Yi-Min Wang, Ming Ma Yuan Niu, Hao Chen Microsoft Research University of California, Davis Redmond, WA 9852, USA Davis, CA 95616-8562, USA 425-882-88

More information

CS 558 Internet Systems and Technologies

CS 558 Internet Systems and Technologies CS 558 Internet Systems and Technologies Dimitris Deyannis deyannis@csd.uoc.gr 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.

More information

A Quantitative Study of Forum Spamming Using Context-based Analysis

A Quantitative Study of Forum Spamming Using Context-based Analysis A Quantitative Study of Forum Spamming Using Context-based Analysis Yuan Niu, Yi-Min Wang, Hao Chen, Ming Ma, and Francis Hsu University of California, Davis Microsoft Research, Redmond {niu,hchen,hsuf}@cs.ucdavis.edu

More information

EVILSEED: A Guided Approach to Finding Malicious Web Pages

EVILSEED: A Guided Approach to Finding Malicious Web Pages + EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of

More information

WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks

WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

F-Secure Internet Security 2014 Data Transfer Declaration

F-Secure Internet Security 2014 Data Transfer Declaration F-Secure Internet Security 2014 Data Transfer Declaration The product s impact on privacy and bandwidth usage F-Secure Corporation April 15 th 2014 Table of Contents Version history... 3 Abstract... 3

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

Website Security: What do I need to know? What do I need to do?

Website Security: What do I need to know? What do I need to do? Website Security: What do I need to know? What do I need to do? This document describes some of the emerging security issues for and threats to websites as well as some of the options to address them.

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

End to End Security do Endpoint ao Datacenter

End to End Security do Endpoint ao Datacenter do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:

More information

Ten Tips to Avoid Viruses and Spyware

Ten Tips to Avoid Viruses and Spyware Ten Tips to Avoid Viruses and Spyware By James Wilson, CPA (480) 839-4900 ~ JamesW@hhcpa.com Oh, the deck is stacked. Don t think for a minute it s not. As a technology professional responsible for securing

More information

IBM Advanced Threat Protection Solution

IBM Advanced Threat Protection Solution IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

Tracking Anti-Malware Protection 2015

Tracking Anti-Malware Protection 2015 Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure

More information

Computer Security Literacy

Computer Security Literacy Computer Security Literacy Staying Safe in a Digital World Douglas Jacobson and Joseph Idziorek CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis

More information

Spyware. Summary. Overview of Spyware. Who Is Spying?

Spyware. Summary. Overview of Spyware. Who Is Spying? Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it

More information

Web Vulnerability Scanner by Using HTTP Method

Web Vulnerability Scanner by Using HTTP Method Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,

More information

ISA 674 Intrusion Detection

ISA 674 Intrusion Detection ISA 674 Intrusion Detection Inviting the attacker to come to you: HoneyPots & HoneyClients! Angelos Stavrou, George Mason University! Honeypots Honeypots are real or emulated vulnerable systems ready to

More information

Enterprise Anti-Virus Protection

Enterprise Anti-Virus Protection Enterprise Anti-Virus APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.

More information

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to

More information

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking

More information

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Detecting and Exploiting XSS with Xenotix XSS Exploit Framework ajin25@gmail.com keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection

More information

Getting Ahead of Malware

Getting Ahead of Malware IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,

More information

ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T.

ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T. Reputation and Blacklist Monitoring Basic Professional Business Enterprise Reputation Monitoring Blacklist Monitoring Standard Malware Detection Scan for known Malware Scan for known viruses All pages

More information

From Russia with Love

From Russia with Love A Trend Micro Research Paper From Russia with Love Behind the Trend Micro-NBC News Honeypots Kyle Wilhoit Forward-Looking Threat Research Team Contents Introduction...1 Environment Setup...1 User Activity...2

More information

You ll learn about our roadmap across the Symantec email and gateway security offerings.

You ll learn about our roadmap across the Symantec email and gateway security offerings. #SymVisionEmea In this session you will hear how Symantec continues to focus our comprehensive security expertise, global intelligence and portfolio on giving organizations proactive, targeted attack protection

More information

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data

More information

Introduction The Case Study Technical Background The Underground Economy The Economic Model Discussion

Introduction The Case Study Technical Background The Underground Economy The Economic Model Discussion Internet Security Seminar 2013 Introduction The Case Study Technical Background The Underground Economy The Economic Model Discussion An overview of the paper In-depth analysis of fake Antivirus companies

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.

Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics. Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based

More information

Host-based Intrusion Prevention System (HIPS)

Host-based Intrusion Prevention System (HIPS) Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

Next Generation IPS and Reputation Services

Next Generation IPS and Reputation Services Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become

More information

ZNetLive Malware Monitoring

ZNetLive Malware Monitoring Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers

More information

Protecting the Infrastructure: Symantec Web Gateway

Protecting the Infrastructure: Symantec Web Gateway Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

A Crawler-based Study of Spyware in the Web. Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy

A Crawler-based Study of Spyware in the Web. Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy A Crawler-based Study of Spyware in the Web Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy What is spyware? Broad class of malicious and unwanted software Steal control of a PC for the benefit of

More information

Small Business Anti-Virus Protection

Small Business Anti-Virus Protection Small Business Anti-Virus Protection APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should

More information

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM

More information

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review

More information

EyjafjallajöKull Framework (aka: Exploit Kits Krawler Framework)

EyjafjallajöKull Framework (aka: Exploit Kits Krawler Framework) EyjafjallajöKull Framework (aka: Exploit Kits Krawler Framework) Seeking Exploit Kits at Large Scale Made Easy By Sébastien Larinier / @Sebdraven & Guillaume Arcas / @y0m This Slide Intentionally Left

More information

Web Client Attacks. Scribed by Gelareh Taban. April 21, 2008. 1 Web Server Attacks continued

Web Client Attacks. Scribed by Gelareh Taban. April 21, 2008. 1 Web Server Attacks continued Web Client Attacks Scribed by Gelareh Taban April 21, 2008 1 Web Server Attacks continued We first conclude our discussion of detection of web server attacks from the previous lecture, which focused on

More information

Victimless Malware How Blackhats Make a Killing Targeting Companies

Victimless Malware How Blackhats Make a Killing Targeting Companies Victimless Malware How Blackhats Make a Killing Targeting Companies Lou Manousos RiskIQ Session ID: HT2-401 Session Classification: Intermediate Serendipity Simple Browser Tricks, Hacks and Kits Large

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection

More information

Firewalls and Software Updates

Firewalls and Software Updates Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

Home Anti-Virus Protection

Home Anti-Virus Protection Home Anti-Virus Protection APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.

More information

Basic Security Considerations for Email and Web Browsing

Basic Security Considerations for Email and Web Browsing Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable

More information

Cisco Reputation Filtering: Providing New Levels of Network Security. Solution Overview

Cisco Reputation Filtering: Providing New Levels of Network Security. Solution Overview Solution Overview Table of Contents Executive Summary...3 Dangerous Threats on the Rise...3 Traditional Defenses Unequal to the Level of Sophisticated Attacks...4 Cisco s Response Cloud-Based Global Intelligence

More information

Te Whare Wananga o te Upoko o te Ika a Maui. Computer Science

Te Whare Wananga o te Upoko o te Ika a Maui. Computer Science VICTORIA UNIVERSITY ÎÍÏ OF WELLINGTON Te Whare Wananga o te Upoko o te Ika a Maui School of Mathematical and Computing Sciences Computer Science PO Box 600 Wellington New Zealand Tel: +64 4 463 5341, Fax:

More information

SOFTWARE UPDATER A unique tool to protect your business against known threats

SOFTWARE UPDATER A unique tool to protect your business against known threats SOFTWARE UPDATER A unique tool to protect your business against known threats OVERVIEW This document explains the functionality of Software Updater. What it is, what it does, how it works, what gets patched

More information

INFORMATION SECURITY REVIEW

INFORMATION SECURITY REVIEW INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

DO YOU USE FIREWALLS?

DO YOU USE FIREWALLS? DO YOU USE FIREWALLS? Great! So do we. And nonetheless, websites get hacked, manipulated and messed up. Even if you protect yourself, you can very quickly become a victim of an attack. You probably know

More information

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. 2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by

More information

Web Application Worms & Browser Insecurity

Web Application Worms & Browser Insecurity Web Application Worms & Browser Insecurity Mike Shema Welcome Background Hacking Exposed: Web Applications The Anti-Hacker Toolkit Hack Notes: Web Security Currently working at Qualys

More information

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices WHITE PAPER Best Practices for Securing Remote and Mobile Devices Table of Contents Executive Summary 3 The Rise of Mobile and Remote Computing 3 Risks from Remote Computing 3 Risks for Mobile Workers

More information

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent

More information

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure

More information

BitDefender for Microsoft ISA Servers Standard Edition

BitDefender for Microsoft ISA Servers Standard Edition BitDefender for Microsoft ISA Servers Standard Edition Copyright 2006 SOFTWIN Edition 1. How Does It Work? As content entering or leaving your company must meet security policies, it is crucial to choose

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013 Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,

More information

Anatomy of Comment Spam

Anatomy of Comment Spam Hacker Intelligence Initiative Anatomy of Comment Spam 1. Executive Summary Spam is defined as irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users, for the purposes

More information

WildFire. Preparing for Modern Network Attacks

WildFire. Preparing for Modern Network Attacks WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends

More information

Sage HRMS 2014 Sage Employee Self Service

Sage HRMS 2014 Sage Employee Self Service Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights

More information

Guidelines for Web applications protection with dedicated Web Application Firewall

Guidelines for Web applications protection with dedicated Web Application Firewall Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior

More information

User Documentation Web Traffic Security. University of Stavanger

User Documentation Web Traffic Security. University of Stavanger User Documentation Web Traffic Security University of Stavanger Table of content User Documentation... 1 Web Traffic Security... 1 University of Stavanger... 1 UiS Web Traffic Security... 3 Background...

More information

Spyware: Causes, Effects and Prevention

Spyware: Causes, Effects and Prevention Spyware: Causes, Effects and Prevention Two-thirds of Internet technology professionals believe spyware will be the top threat to network security this year, according to a January 2005 poll by WatchGuard

More information

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Enterprise-Grade Security from the Cloud

Enterprise-Grade Security from the Cloud Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security

More information

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

7 Steps to Safer Computing

7 Steps to Safer Computing 7 Steps to Safer Computing These are the seven essentials: - Use a firewall. - Keep your software up to date. - Use an up to date antivirus program. - Use an up to date anti-spyware program. - Only download

More information

The current case DNSChanger what computer users can do now

The current case DNSChanger what computer users can do now The current case DNSChanger what computer users can do now Content What happened so far? 2 What is going to happen on 8 March 2012? 2 How can I test my Internet settings? 2 On the PC 3 On the router 5

More information

Banking Security using Honeypot

Banking Security using Honeypot Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information

More information

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI Na przykładzie Junos WebApp Secure Edmund Asare INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations

More information

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,

More information

UNCLASSIFIED. http://www.govcertuk.gov.uk. General Enquiries. Incidents incidents@govcertuk.gov.uk Incidents incidents@govcertuk.gsi.gov.uk.

UNCLASSIFIED. http://www.govcertuk.gov.uk. General Enquiries. Incidents incidents@govcertuk.gov.uk Incidents incidents@govcertuk.gsi.gov.uk. Version 1.2 19-June-2013 GUIDELINES Incident Response Guidelines Executive Summary Government Departments have a responsibility to report computer incidents under the terms laid out in the SPF, issued

More information

BitDefender Client Security Workstation Security and Management

BitDefender Client Security Workstation Security and Management BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

HERE IT IS. THE HELLO YOU. Privacy policy

HERE IT IS. THE HELLO YOU. Privacy policy HERE IT IS. THE HELLO YOU Privacy policy Keep reading but remember: Warrior. Not worrier. VIA JAMES VICTORE Privacy policy INTRO THE WEBSITE This privacy policy is for this website www.helloyou.digital

More information

Home Anti-Virus Protection

Home Anti-Virus Protection Home Anti-Virus Protection JANUARY - MARCH 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security

More information

HP Network Protector SDN Application - 1.1.15 Release Notes

HP Network Protector SDN Application - 1.1.15 Release Notes HP Network Protector SDN Application - 1.1.15 Release Notes Abstract This document contains supplemental information for the HP Network Protector SDN Application Release 1.1.15. HP Part Number: 5998-6987

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Multifaceted Approach to Understanding the Botnet Phenomenon

Multifaceted Approach to Understanding the Botnet Phenomenon Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic

More information

Introduction: 1. Daily 360 Website Scanning for Malware

Introduction: 1. Daily 360 Website Scanning for Malware Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover

More information