|How do you perform on a test that determines whether you're vulnerable to threats contained on a known malicious website? |
How are we testing?:
This test checks to see if a benign object hosted on a known malicious site is blocked by your security solution. It uses a compromised site from a list published by Google. It does not attempt to download actual malware.
Why is this test important?:
Hackers often launch zero day attacks by setting up many new sites hosting malicious code or objects; Continuously revolving domain names, hackers attempt to deliver targeted malware to your employees. Effective protection requires real-time updates of malicious sites to be fed to your inline security engines.
Use reputation-based filtering to block malicious sites
Every week hundreds of thousands of new unsafe websites are discovered. An unsafe website may contain code used to install malicious software onto users’ computers without their knowledge (malware) or pose as a legitimate site trying to trick users into sharing their username and password or other sensitive information (phishing). Many unsafe websites are actually legitimate websites that have been compromised.
|In the News:|
23 Mar 2017
But most CAs think you should go further and filter out malicious sites -- sort of applying a 'common sense' rule," Lynch said. "Prior to Let's Encrypt, all the major CAs agreed that malicious use was an issue and they worked to prevent it. Now, in the ...
22 Mar 2017
LastPass patched three separate bugs that affected its Chrome and Firefox browser extensions, which if exploited, would have allowed a third-party to extract passwords from users visiting a malicious website. All bugs were discovered by Tavis Ormandy, ...
21 Mar 2017
Credentials-stealing malware part of exploit kit distributed to people who recently visited adult sites.