Detect threat patterns across your web and mobile assets
Posted on 06 August 2014.
During the Black Hat conference in Las Vegas, RiskIQ announced an automated platform with global reach that enables organizations to discover, scan for malware and gather threat intelligence on all websites and mobile apps that are legitimately or illegally associated with their business.


The technology provides companies with actionable intelligence needed to prevent criminals from exploiting their brands to plant attacks that target unsuspecting users.

In a recent assessment of the more than 27,000 websites associated with the top five healthcare companies in the US, the RiskIQ service discovered that 16 percent had broken SSL certificates and 77 percent contained pages that were either inactive, redirecting traffic or broken. This snapshot illustrates the scale of the problem that large companies face in trying to keep track of their legitimate web properties, police them for malware and identify sites that may be impersonating their brand.

The RiskIQ platform deploys a worldwide network of software-based virtual users to automatically discover and inventory websites, online ads and mobile apps that are legitimately or fraudulently linked to a company or any of its brands. RiskIQ’s continuous discovery capabilities can identify all instances associated with a company on the internet including those on third party sites, in embedded and referring URLs, and across 90 different app stores.

For each discovered asset, RiskIQ automatically captures full session and document object data (DOM) to create a dynamic inventory of its attributes (registration date, owner, geography, etc.). This global visibility enables organizations to conclusively know and manage their web and mobile foot print.

To pinpoint a company’s web and mobile assets that are posing a risk to its customers, RiskIQ’s virtual user software interacts with web pages, launches mobile apps and follows embedded URLs the way a human user would. This technology disarms evasion techniques used by malware to hide from traditional web crawlers and mobile app scanning agents. RiskIQ automatically and continuously assesses/classifies each web page for the presence of malware, malicious advertisements, capturing of personally identifiable information, etc. It also discovers copycat, malicious and data stealing mobile apps.

“For most companies, maintaining an inventory and policing their websites and mobile apps for malware and brand infringement is manually impossible. Nevertheless, they’re still responsible for detecting and taking down threats that place users at risk,” said Elias Manousos, CEO of RiskIQ. “We enable companies to immediately regain visibility and control over their web and mobile resources, including those that are usurping their brand, to keep them free of malware and other threats.”

To help enterprises manage, audit and uncover threat patterns across their web and mobile assets, RiskIQ provides an intelligence and analytics dashboard populated with three years of current and historical threat data. It enables users to run Big Data queries across their web and mobile assets for expired SSL certificates, third party scripts and cookies, instances of malware, typo squatting, exploit kits and more. RiskIQ can be used to discover co-occurrences, such as the presence of a specific malware across all assets, and to perform compliance assessments.

The RiskIQ platform for Web and Mobile is available immediately from RiskIQ and its business partners, and pricing is based on volume and frequency of examined assets.






Spotlight

Emerging cloud threats and how to address them

Posted on 15 September 2014.  |  Public and community clouds can be appealing targets for hackers looking to disrupt or steal information from scores of organizations with one successful strike. Here are some emerging security threats and issues cloud providers and their clients should be aware of.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 16th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //