|How do you perform on a test that determines whether you're vulnerable to threats contained on a known malicious website? |
How are we testing?:
This test checks to see if a benign object hosted on a known malicious site is blocked by your security solution. It uses a compromised site from a list published by Google. It does not attempt to download actual malware.
Why is this test important?:
Hackers often launch zero day attacks by setting up many new sites hosting malicious code or objects; Continuously revolving domain names, hackers attempt to deliver targeted malware to your employees. Effective protection requires real-time updates of malicious sites to be fed to your inline security engines.
Use reputation-based filtering to block malicious sites
Every week hundreds of thousands of new unsafe websites are discovered. An unsafe website may contain code used to install malicious software onto users’ computers without their knowledge (malware) or pose as a legitimate site trying to trick users into sharing their username and password or other sensitive information (phishing). Many unsafe websites are actually legitimate websites that have been compromised.
|In the News:|
29 Apr 2017
Facebook has admitted that “malicious actors” had created “fake personas” to spread fake news across its social network last year. The admission came in a report by the technology firm's security team, which said its data “does not contradict” the US ...
29 Apr 2017
Khulu Phasiwe says the two organisations have done work for Eskom in the past and have indeed been beneficiaries of funding from them.
24 Apr 2017
POLICE are investigating after “malicious” messages were left on a school website by Turkish nationalists in an apparent hacking attempt. Parents of students at North Mundham primary in Sussex were left concerned after the school's website was taken ...