Abstract:
Systems and methods for detecting and identifying malware/potentially harmful applications based on behavior characteristics of a mobile application are disclosed. One embodiment of a method of detecting a potentially harmful application includes detecting behavior characteristics of a mobile device and, based on those detected behavior characteristics, identifying one or more indicators that the mobile application is a potentially harmful application. Those indicators are then analyzed to determine whether the application is a potentially harmful application.
Abstract:
A security system may include a normally open relay between an external network connection and at least one internal network connection, a network controller, and a microcontroller. The network controller may be configured to monitor for malicious activity on an external network accessible through the external network connection. The microcontroller may be configured to cause the normally open relay to temporarily close in response to the network controller failing to detect the malicious activity for a predetermined amount of time and cause the normally open relay to remain open and generate an alert in response to the network controller detecting the malicious activity.
Abstract:
Die Erfindung betrifft eine Datenverarbeitungsanordnung (1) zum Informationsaustausch, mit einer Netzwerkeinrichtung (5), welche eine Mehrzahl von Datenverarbeitungsvorrichtungen als Teilnehmer (10, 20, 30) verbindet, mit zumindest einem ersten, informationsgebenden Teilnehmer (10), welcher wenigstens eine Informationsabfrage wenigstens eines zweiten, informationsanfordernden Teilnehmers (20) empfängt. Außerdem betrifft die Erfindung ein Verfahren (100) zum Betrieb einer solchen Datenverarbeitungsanordnung (1). Es wird vorgeschlagen, den wenigstens einen ersten Teilnehmer (10) mit zumindest einer Behandlungseinrichtung (12) zu versehen, welche die wenigstens eine Informationsabfrage in ein codiertes Format wandelt, außerdem den ersten Teilnehmer (10) mit zumindest einer Umsetzungseinrichtung (14) zu versehen, welche codierte, abgebildete Informationsabfragen kontaktfrei erfasst und in ein maschinenlesbares Format umwandelt, und den wenigstens einen ersten Teilnehmer (10) mit eine Verarbeitungseinrichtung (16) zu versehen, welche anhand der Informationsabfrage unter Abgleich mit einem vorgehaltenen Informationsbestand (50) wenigstens eine Antwortinformation erzeugt und durch Rückgabe der wenigstens einen Antwortinformation in Richtung des zweiten Teilnehmers (20) die wenigstens eine Informationsabfrage beantwortet
Abstract:
This disclosure provides systems, methods and apparatus, including computer programs encoded on computer storage media for mitigating an Internet of things (IoT) worm. In one aspect, a processor of a router device may randomly select a plurality of Internet Protocol (IP) addresses. The processor may expose one or more emulated services at the plurality of randomly selected IP addresses. The processor may determine whether IoT worm communication activity is detected at one of the randomly selected IP addresses. The processor may grant to, or otherwise enable, an IoT worm access to one of the emulated services in response to detecting IoT worm communication activity at one of the selected IP addresses.
Abstract:
A Threat Intelligence Cloud is disclosed. The Threat Intelligence Cloud can include a machine. A receiver on the machine can receive an electronic file including a threat detected by an anti-virus solution. A Virus Total Service can determine information from traditional anti-virus solutions scanning the electronic file. A database can store the information from the Virus Total Service. A report generator can generate a report from the information.
Abstract:
Examples disclosed herein relate to strength of associations among data records in a security information sharing platform. Some examples may enable creating, in the security information sharing platform, an association between a security indicator comprising an observable, and a data record. Some examples may further enable determining strength of the association between the security indicator and the data record based on at least one of: a likelihood of change in the association; a creator of the association; an aging rate of the association; or a quality of evidence that supports the association.
Abstract:
Malware detection logic executed by a secured device residing in a home network may receive a message from an unsecured device of a first unsecured network and intended for a destination device of the home network, the destination device comprising a security client. The malware detection logic may establish a secure communication channel between the malware detection logic of the secured device and the security client of the destination device. The malware detection logic may execute a validation test on the message to determine that the message includes malware. The malware detection logic may report an alarm to the security client of the destination device. The malware detection logic may transmit information related to the malware to a cloud computing server. The malware detection logic may prevent an application associated with the destination device from processing the message.
Abstract:
A computer implemented method to identify malicious software in a computer system comprising: receiving an indication of a detection of malicious network traffic communicated via a computer network accessed by the computer system; identifying a software component involved in the malicious network traffic at the computer system; evaluating a measure of a correlation fractal dimension (CFD) for at least a portion of the software component; and storing the measure of CFD for subsequent comparison with a second measure of CFD for a corresponding portion of a second software component in the computer system to identify the second software component as a software component involved in malicious network communication.
Abstract:
A data frame transmitted over a serial link between a destination network and a source network is received by a computer-implemented system in the destination network. The data frame is compatible with a data link layer protocol and includes a data field. The computer-implemented system in the destination network converts the data frame directly into a format compatible with an application layer protocol, where converting the data frame into the format comprises interpreting received information included in the data field as numerical values rather than executable code. The computer-implemented system in the destination network outputs the numerical values to an application in the destination network.
Abstract:
Systems and methods are provided herein for use in identifying and/or detecting electronic message containing malicious content. One exemplary method includes receiving multiple electronic tags. Each of the multiple electronic tags corresponds to an electronic message and a use, and the user caused the electronic tag to be associated with the electronic message based on a perception that the electronic message included malicious content. The exemplary method further includes assigning, for each electronic tag, point(s) to the corresponding user when the corresponding electronic message includes malicious content, totaling, for each user, the point(s) assigned during a predefined interval, and identifying one of the user(s) with a highest total point(s), for the defined interval, as a winner, thereby incentivizing users to associate electronic tags with electronic message perceived to include malicious content.