Abstract:
A script-based scan engine is embedded in a webpage requested by a client computer from a web server. The script-based scan engine may be embedded in the webpage by injecting the script-based scan engine in a header of the webpage in a computer security device between the client computer and the web server, or by integrating the script-based scan engine in the webpage as a library. The script-based scan engine executes in the client computer when the webpage is received by the client computer. The script-based scan engine scans the webpage for web threats, which may include malicious codes, exploits, and phishing, for example. The webpage is allowed to be rendered by a web browser in the client computer when the webpage is deemed safe by the script-based scan engine.
Abstract:
Cross-site scripting vulnerabilities in a Web browser that may lead to malware execution on a computing device are reduced. The specific vulnerabilities arise from HTML-based e-mails using e-mail service providers (e.g., Hotmail, Gmail, Yahoo) that have unknown or malformed HTML elements and Javascripts. These unknown elements may execute in a browser and cause harm to the computing device. To prevent this, the e-mail is parsed to create a DOM tree. The DOM tree is filtered using a normal element filter. The modified DOM tree is filtered a second time using a script analyzer filter to isolate potentially harmful HTML and Javascript elements. These elements are then emulated to determine which of them are in fact malicious. These malicious elements are then prevented from executing, for example, by preventing the e-mail recipient from opening the e-mail in the browser.
Abstract:
An application-based routing arrangement for routing a plurality of data packets associated with a set of applications partially through a network is provided. The application based policy includes the first set of rules associated with the first application of the set of applications, which includes the first routing specification for routing the first set of data packets. The application routing table is configured to dynamically update the first set of parameters when the first application is connected to the network. The application routing table also includes a hook module to configure the matching of the first data packet associated with the first application against the application routing table to determine the first routing specification using the first routing specification if a match is found.
Abstract:
A method for facilitating connection between an entity's network and a first electronic device is provided. The method includes receiving, using an RFID (radio frequency identification) reader associated with the first electronic device, a first file from an RFID tag, the RFID tag being provided by the entity. The method also includes obtaining connection information from the first file, the connection information including at least one of a security policy and network configuration. The method further includes enabling a user to attempt to log in via the first electronic device, using the connection information, into the network, wherein the log in is attempted using a different connection modality than that employed to receive the first file from the RFID tag.
Abstract:
Disclosed are methods and apparatus for protecting computers from data loss involving screen capture. Screen capture events are detected in a computer. Documents that are visible on a computer screen are identified. Files of the visible documents are identified and scanned for sensitive data to determine whether the screen capture events are targeting contents of sensitive documents.