Cloud Security Authors: Pat Romanski, Liz McMillan, Elizabeth White, Zakia Bouachraoui, Yeshim Deniz

Related Topics: Cloud Security

News Feed Item

Financial Organizations at Risk From Spyware and Malicious Web Threats Despite Existing Security Measures

Security Audit Performed by Finjan's Malicious Code Research Center Shows that Spyware Comprises Two-Thirds of Security Policy V

SAN JOSE, California, June 19 /PRNewswire/ -- Finjan Inc., the global provider of best-of-breed proactive web security solutions for businesses and organizations, warns that financial organizations are still at risk from web-borne threats, such as spyware and malicious code, despite their use of Anti-Virus and URL Filtering security solutions. A recent security audit conducted by Finjan for a major financial organization clearly showed the growing proportion of web-borne threats, which were not detected by traditional anti-virus and firewall products that were in place.

Finjan's security audit affirms that the most prevalent security threat for financial institutions is spyware. An overwhelming 67% of security policy violations recorded during this audit were related to spyware downloads, attempts to access spyware websites or attempts to access websites that hide executable spyware.

"IT security is a key priority for financial organizations, which realize the serious implications of today's web-borne threats to their business and to the integrity of their customers' private information," stated Yuval Ben-Itzhak, CTO at Finjan. "The growing phenomenon of targeted attacks, aimed at stealing identities or compromising confidential information from a particular system or computer, is nearly impossible to detect using traditional security tools. Moreover, based on their knowledge of the workings of traditional security systems such as firewalls, anti-virus and URL Filtering products, hackers are crafting malicious code and targeted attacks to outsmart such systems."

The security audit was based on live Internet traffic gathered from the browsing activities of 5,000 users, representing a small segment of the financial organization's users. Finjan's Vital Security Web Appliance scanned all content downloaded over a two-week period. The Vital Security log files were then analysed by Finjan's Malicious Code Research Center (MCRC). The findings were based on counting each content type that violated the financial institution's security policy. Out of a total of 67,916 security policy breaches, Spyware accounted for 67 percent while behavior-based violations (i.e., malicious scripts and malicious active content) constituted a further 32 percent.

Finjan's web security solutions utilize patented behaviour-based technology to proactively repel all types of web-borne threats. These appliances protect against new and unknown attacks long before traditional anti-virus companies can release a signature update or software vendors can patch their solutions. In addition, MCRC's ongoing research activities enable customers to continuously benefit from early discovery of new software vulnerabilities prior to the availability of software patches. With Finjan's web security in place, corporate users can take full advantage of the web as a business tool, increasing productivity without security worries.

Ben-Itzhak concluded: "The FBI's 2005 Computer Crime Survey revealed that about 80 per cent of organizations surveyed were affected by Spyware. Finjan's latest security audit confirms that this trend is a serious threat to which financial institutions must respond."

For additional information from live security audits performed by Finjan, please visit the MCRC section of our website (http://www.finjan.com/Content.aspx?id=573).

About MCRC

Malicious Code Research Center (MCRC) is the leading research department at Finjan, dedicated to the research and detection of security vulnerabilities in Internet and email applications as well as other popular applications. MCRC's goal is to continue to be steps ahead of hackers attempting to exploit open platforms and technologies to develop malicious code such as spyware, Trojans, phishing attacks, worm and viruses. MCRC researchers work with the world's leading software vendors to help patch their security holes, as well as contribute to the development of next generation defense tools for Finjan's proactive secure content management solutions. For more information, visit our MCRC subsite (http://www.finjan.com/SecurityLab.aspx?id=547).

About Finjan

Finjan is a global provider of best-of-breed web security solutions for businesses and organisations. Our proactive, appliance-based solutions deliver the most effective shield against web-borne threats, freeing enterprises to harness the web for maximum commercial results. Finjan's web security solutions utilise patented behaviour-based technology to proactively repel all types of threats arriving via the web, such as Spyware, Phishing, Trojans and other malicious code, securing businesses against unknown and emerging threats, as well as known malware. Finjan's security solutions have received industry awards and recognition from leading analyst houses and publications including IDC, Butler Group, SC Magazine, CRN, PCPro, ITWeek, and Information Security. With Finjan's award-winning and widely used solutions, businesses can focus on implementing web strategies to realise their full organisational and commercial potential. For more information about Finjan, please visit: http://www.finjan.com/.

(c) Copyright 1996-2006. Finjan Inc. and its affiliates and subsidiaries. All rights reserved.

All text and figures included in this publication are the exclusive property of Finjan and are for your personal and non-commercial use. You may not modify, copy, distribute, transmit, display, perform, reproduce, publish, license, create derivative works from, transfer, use or sell any part of its content in any way without the express permission in writing from Finjan. Information in this document is subject to change without notice and does not present a commitment or representation on the part of Finjan. The Finjan technology and/or products and/or software described and/or referenced to in this material are protected by registered and/or pending patents including U.S. Patents No. 6092194, 6154844, 6167520, 6480962, 6209103, 6298446, 6353892, 6804780, 6922693, 6944822, 6993662, 6965968, 7058822 and may be protected by other U.S. Patents, foreign patents, or pending applications.

Finjan, Finjan logo, Vital Security, Vulnerability Anti.dote and Window-of-Vulnerability are trademarks or registered trademarks of Finjan Inc., and/or its affiliates and subsidiaries. Sophos is a registered trademark of Sophos plc. McAfee is a registered trademark of McAfee Inc. Kaspersky is a registered trademark of Kaspersky Lab. SurfControl is a registered trademark of SurfControl plc. Secure Computing is a registered trademark of Secure Computing Corporation. Microsoft and Microsoft Office are registered trademarks of Microsoft Corporation. All other trademarks are the trademarks of their respective owners.

Media Contacts United States Europe Jan Wiedrick-Kozlowski Dawn Harnetty/Jon Angeloni Activa PR Spreckley Partners Tel. +1-585-392-7878 Tel: +44(0)207-388-9988 Email: [email protected] Email: [email protected]

Finjan Software

CONTACT: Media Contacts - United States, Jan Wiedrick-Kozlowski, Activa
PR, Tel. +1-585-392-7878, Email: [email protected]; Europe, Dawn Harnetty/Jon
Angeloni, Spreckley Partners, Tel: +44(0)207-388-9988, Email:
[email protected]

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...
The term "digital transformation" (DX) is being used by everyone for just about any company initiative that involves technology, the web, ecommerce, software, or even customer experience. While the term has certainly turned into a buzzword with a lot of hype, the transition to a more connected, digital world is real and comes with real challenges. In his opening keynote, Four Essentials To Become DX Hero Status Now, Jonathan Hoppe, Co-Founder and CTO of Total Uptime Technologies, shared that ...
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing mo...
When Enterprises started adopting Hadoop-based Big Data environments over the last ten years, they were mainly on-premise deployments. Organizations would spin up and manage large Hadoop clusters, where they would funnel exabytes or petabytes of unstructured data.However, over the last few years the economics of maintaining this enormous infrastructure compared with the elastic scalability of viable cloud options has changed this equation. The growth of cloud storage, cloud-managed big data e...
Your applications have evolved, your computing needs are changing, and your servers have become more and more dense. But your data center hasn't changed so you can't get the benefits of cheaper, better, smaller, faster... until now. Colovore is Silicon Valley's premier provider of high-density colocation solutions that are a perfect fit for companies operating modern, high-performance hardware. No other Bay Area colo provider can match our density, operating efficiency, and ease of scalability.