Abstract:
In an example embodiment described herein, keyboard monitoring logic is operable to obtain data typed into a keyboard. The data typed into the keyboard is compared with predefined protected data stored in a local credential file, if data typed into the keyboard matches predefined protected data stored in the credential file, the keyboard monitoring logic determines whether the destination of the typed data ( e.g. , the application, website, or both the application and website are stored in a whitelist. If the destination is not stored in the whitelist, the keyboard monitoring logic determines that an attempt of unauthorized access to protected data is occurring.
Abstract:
In example embodiments described herein, a device driver is employed to protect certain files. The device driver registers itself with an operating system and requests system notifications when a process attempts to delete, write data, or change attributes of a file. The device driver intercepts messages to delete, write data, or change attributes of a file and determines whether the request is for a protected file. If the request is for a protected file, the request is denied.
Abstract:
Anti-malware software has two components that work in coordination: a browser component and a local-server component. The browser component runs within a web browser or other suitable application, and the browser component receives and forwards at least one web- related data set to the local-server component via an assistive-technology module. In response to receiving the at least one web-related data set sent from the browser component, the local-server component executes an algorithm on the at least one web-related data set or portions of the at least one web-related data set. As an example, the algorithm may be an anti-malware algorithm directed to determining whether the at least one web-related data set is either an authentic data set or potential malware.
Abstract:
Computer systems Methods (implemented through instructions carried by a medium) and apparatus for protecting a process or thread (102, 202) against forced terminations are disclosed. The protection is accomplished by monitoring of commands targeting the processes or threads (102, 202) under protection. In one example embodiment (100), Operating Systems' API (108) usage is monitored by a Operating System Device Driver (104) using kernel hooks. In another example embodiment (200), that monitoring occurs using kernel callbacks.
Abstract:
A presente invenção refere- se a ura servidor local que é configurado para trocar dados com um navegador local por um canal de protocolo de comunicações duplex-pleno. A lógica legível por computador, que roda no servidor local, é operacional para realizar um algoritmo sobre dados que são recebidos a partir de ou para serem enviados para o navegador local.
Abstract:
In an example embodiment, phishing attacks are detected by analyzing visual data associated with a web page. Patterns in the visual data are compared with a list of known patterns associated with known web pages. If there is a match, the web page is determined to be a malicious web page.