Perimeter

8/5/2014
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

6Scan Announces Automated Malware Quarantine for Websites

New protection works at the web application layer to respond in real time to emerging malware threats

[San Francisco]—August 5, 2014—6Scan  (www.6Scan.com), a leading provider of automated website security services for small businesses, announced today that it is adding Automated Malware Quarantine, a patent-pending real-time malware detection-and-response technology, to its suite of website scanning, vulnerability repair and malware remediation solutions. This new technology effectively automates malware protection, securing websites from emerging threats as soon as they appear.

Malware a significant threat to small business websites

The ability to detect and immediately react to web-based malware is critical as small businesses are targeted by increasingly sophisticated attacks.  Microsoft, in an attempt to stem the rampant distribution of web-based malware, recently seized control of 5 million subdomains that were using Dynamic DNS service No-ip.com. Dynamic DNS, often combined with advanced cloaking techniques, is used by sophisticated hackers to conceal their attacks.  These techniques make it imperative to quickly on the first pass, before it goes into stealth mode and re-emerges later.

“As threats to small businesses become more advanced solutions need to keep pace” explains 6Scan CEO Chris Weltzien. “And for small businesses, with limited resources and few, if any, dedicated IT security staff, it’s critical that these solutions are proactive and automated. With our latest release, 6Scan makes powerful real-time protection available to business and organizations of all sizes, regardless of their internal IT resources.”

The upward trend of small businesses managing their own websites amplifies this need. The National Small Business Association 2013 Technology Survey found that 66% of small businesses maintain their own websites, up 15% from the 2010 report.   Meanwhile the report indicates that 64% of companies consider maintain the site “a major challenge.”

Protection that’s faster than hackers

85% of malicious links are hosted on hacked legitimate websites, according to industry research, and small businesses bear the brunt of these attacks. Smaller sites are often targeted because they have few security resources available. Once they have been hacked and infected with website viruses, these small business run the risk of distributing malware to their customers and even being blacklisted—effectively disappearing from search engines and popular browsers.

6Scan’s comes to the rescue of small businesses with Automated Malware Quarantine, the industry’s first real-time malware solution that works automatically on the web application layer. This new approach dramatically reduces the risk window between infection and removal. Automated Malware Quarantine is available to 6Scan customers today as part of its Professional and Enterprise security suite offerings.

About 6Scan

Headquartered in Tel Aviv’s booming technology startup district, 6Scan’s mission is to reverse the rising trend of successful website hacks, making the Internet a safer place for website owners as well as for users. As more and more websites use 6Scan’s one-click, always-updated protection, hackers will have less and less surface area to perform their attacks.

###

For more information, press only:

[email protected]

For more information on Automated Malware Quarantine and the 6Scan suite:

www.6scan.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11354
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.
CVE-2018-11355
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.
CVE-2018-11356
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
CVE-2018-11357
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
CVE-2018-11358
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.