Viruses Spread by Booby-Trapped Web Sites?
To distribute viruses, worms, trojans and other malware, hackers increasingly use drive-by-downloads. They set up bogus web sites (often they trick search engines into linking to those sites), and then they infect PCs with bad code when unsuspecting visitors arrive (drive-by).
To thwart drive-by downloads, traditional anti-virus software tries to evaluate incoming code and stop the malware from causing damage after it arrives. That strategy is less-than-perfect.
A newer strategy is to avoid visiting dangerous sites in the first place. Cyberpatrol supports this strategy with an angle that is especially cost-effective for small-to-mid-sized enterprises (schools, churches, libraries, businesses, community centers). Enterprise customers can use Cyberpatrol’s SiteSURV 4.0 to prevent users from browsing sites identified as malware spreaders.
Cyberpatrol’s web filtering is based on SiteCAT, a system that constantly crawls the web, categorizing sites according to their purpose. SiteCAT has upgraded specifically to look for sites whose purpose is to deliver malware.
Cyberpatrol SiteSURV thus becomes a powerful enterprise weapon in the war against malware.
“In early June, we’ll be releasing SiteSURV 4.0,” says Chris Overton, Cyberpatrol’s VP of Research and Development. “This product takes advantage of our SiteCAT system to protect users from a broad range of online threats. SiteSURV can typically be configured to protect an entire network in less than 15 minutes, and is extremely cost-effective when compared with other network-wide online security tools. This new 4.0 version includes very flexible configuration options that will allow each organization to tailor the protection to its specific needs. It also provides basic reporting features that allow a customer to see what SiteSURV is doing to protect its network.”
–Ben Wright, instructor on the law of electronic records and data security at the SANS Institute.