摘要:
Malicious message detection and processing systems and methods are provided herein. According to some embodiments, the messages are emails and the method for processing emails may be facilitated by way of an intermediary node which may be cloud-based. The intermediary node may be communicatively couplable with an email client and an email server. The intermediary node may execute a method that includes analyzing a link included in an email to determine if the link is associated with a potentially malicious resource, and replacing the link with an alternate link to a trusted resource if the link is associated with a potentially malicious resource.
摘要:
Intrusion features of a landing page associated with sponsored content are identified. A feature score for the landing on page based on the identified intrusion features is generated, and if the feature score for the landing page exceeds a feature threshold, the landing page is classified as a candidate landing page. A sponsor account associated with the candidate landing page can be suspended, or sponsored content associated with the candidate landing page can be suspended.
摘要:
Systems and methods for deploying countermeasures against unauthorized scripts interfering with the rendering of content elements on information resources are provided herein. A computing device can receive an information resource including a content rendering verification script and a first content element. The computing device can execute the script. The computing device can render the first content element for display on the information resource in a first format. The computing device can determine that the first content element is not successfully displayed in the first format. The computing device can render the first content element for display on the information resource in a second format, responsive to the determination. The computing device can determine that the first content element is successfully displayed in the second format. The computing device can display a second content element of the information resource responsive to the determination.
摘要:
A software verification system including a cloud service, a plurality of test nodes, a client manager, and an expediter is disclosed. The cloud service is a commercially available shared resource service having two or more physical machines, each of which is configured to host a plurality of virtual machines. Each test node is one virtual machine running a platform. The client manager manages a verification session between one of the clients and the verification system. The expediter recognizes the available platforms for use by the test nodes in a cloud service pool of servers and a local pool of servers. When a clients requests the verification session to use a specific platform, the expediter obtains a network address of an available test node running the specified platform and connects the requesting client to the available test node running the requested platform. If the requested platform is not available, a new virtual machine, located in the local pool of servers, having the requested platform is started and connected with the requesting client.
摘要:
Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A prompt is displayed to advise a user that the object has been suppressed, and to provide an opportunity to interactively accept or decline activation of an action for the object.
摘要:
The present invention discloses a legal installation package acquiring method and apparatus, a computer program and a recording medium, which pertain to the field of computer technology. The method comprises: acquiring (201) characteristic information of a first installation package; sending (202) the characteristic information to an authentication server; receiving (203) a differential package fed back by the authentication server; and combining (204) the differential package with the first installation package to obtain a legal installation package.
摘要:
Embodiments of the present invention provide a web page automated testing method and apparatus. In the web page automated testing method, target network interaction data sent by a browser to a server is obtained by using a network agent module. Then, a web page automated testing tool validates the target network interaction data, thereby implementing validation on network interaction data between the browser or a web page and the server; a network request in the target network interaction data is validated, which improves a capability of finding a web page defect; and a response message returned by the server is validated, which improves accuracy of a web page display validation result.
摘要:
Secure configuration of a mobile application ("app") includes sending the required configuration data for the app to the user's mobile computing device in a communication, for example an email with an attachment. A verification value is included in the attachment to protect the authenticity and integrity of the configuration data. A challenge code is issued to the user (or group of users). The challenge code is used to verify the configuration data.