Perimeter
8/5/2014
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

6Scan Announces Automated Malware Quarantine for Websites

New protection works at the web application layer to respond in real time to emerging malware threats

[San Francisco]—August 5, 2014—6Scan  (www.6Scan.com), a leading provider of automated website security services for small businesses, announced today that it is adding Automated Malware Quarantine, a patent-pending real-time malware detection-and-response technology, to its suite of website scanning, vulnerability repair and malware remediation solutions. This new technology effectively automates malware protection, securing websites from emerging threats as soon as they appear.

Malware a significant threat to small business websites

The ability to detect and immediately react to web-based malware is critical as small businesses are targeted by increasingly sophisticated attacks.  Microsoft, in an attempt to stem the rampant distribution of web-based malware, recently seized control of 5 million subdomains that were using Dynamic DNS service No-ip.com. Dynamic DNS, often combined with advanced cloaking techniques, is used by sophisticated hackers to conceal their attacks.  These techniques make it imperative to quickly on the first pass, before it goes into stealth mode and re-emerges later.

“As threats to small businesses become more advanced solutions need to keep pace” explains 6Scan CEO Chris Weltzien. “And for small businesses, with limited resources and few, if any, dedicated IT security staff, it’s critical that these solutions are proactive and automated. With our latest release, 6Scan makes powerful real-time protection available to business and organizations of all sizes, regardless of their internal IT resources.”

The upward trend of small businesses managing their own websites amplifies this need. The National Small Business Association 2013 Technology Survey found that 66% of small businesses maintain their own websites, up 15% from the 2010 report.   Meanwhile the report indicates that 64% of companies consider maintain the site “a major challenge.”

Protection that’s faster than hackers

85% of malicious links are hosted on hacked legitimate websites, according to industry research, and small businesses bear the brunt of these attacks. Smaller sites are often targeted because they have few security resources available. Once they have been hacked and infected with website viruses, these small business run the risk of distributing malware to their customers and even being blacklisted—effectively disappearing from search engines and popular browsers.

6Scan’s comes to the rescue of small businesses with Automated Malware Quarantine, the industry’s first real-time malware solution that works automatically on the web application layer. This new approach dramatically reduces the risk window between infection and removal. Automated Malware Quarantine is available to 6Scan customers today as part of its Professional and Enterprise security suite offerings.

About 6Scan

Headquartered in Tel Aviv’s booming technology startup district, 6Scan’s mission is to reverse the rising trend of successful website hacks, making the Internet a safer place for website owners as well as for users. As more and more websites use 6Scan’s one-click, always-updated protection, hackers will have less and less surface area to perform their attacks.

###

For more information, press only:

[email protected]

For more information on Automated Malware Quarantine and the 6Scan suite:

www.6scan.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.