Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Startup Launches Free Malware Blocker

Haute Secure comes out of stealth mode with freeware that can recognize and filter malware at the client

A new, free software tool promises to recognize incoming malware -- and prevent it from being loaded onto your computer.

Haute Secure, a startup that was founded last year and has received $500,000 in seed-round funding, today launched a beta version of its eponymous application, which runs on Windows. The free download, which is designed for individual users, is available to anyone who wants to kick its tires.

Haute Secure uses a special algorithm to reveal the behavior displayed by malware when it is trying to install itself on a client machine. When it sees this sort of behavior, it can react to prevent the installation from occurring, according to Steve Anderson, vice president of marketing for the startup.

"It sits at the kernel level in Windows and watches about 70 API calls," Anderson says. "It allows you to set rules of behavior for applications, and if those rules are violated, it can stop a download from occurring."

In addition, Haute Secure is collecting a database of malicious links -- both known and newly-discovered -- that it will use to help identify risky sites and downloads so that the malware never makes it to the machine, much less gets installed.

"There are tools that offer some of this functionality now, but when they find a problem, they block the entire site," Anderson observes. "What we're doing is allowing users to surf safely, without completely blocking them from the sites they want to go to."

Haute Secure also is developing server-side technology that will let enterprises check their systems for malware and prevent it from spreading across the organization. Eventually, the company plans to roll out a subscription service, but it probably will continue to offer the malware filter/blocker for free to PC users, Anderson says. "We see that functionality becoming a commodity."

For now, Haute Secure will compete for the attention of users who have experimented with Websense and McAfee's SiteAdvisor, Anderson acknowledges. "Those were good first attempts, and they were inspirations for us," he says. "But we think we're going farther."

A general release of the software is planned for September.

— Tim Wilson, Site Editor, Dark Reading

  • Haute Secure
  • McAfee Inc. (NYSE: MFE)
  • Websense Inc. (Nasdaq: WBSN) Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    How to Better Secure Your Microsoft 365 Environment
    Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
    Attackers Leave Stolen Credentials Searchable on Google
    Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2020: The Year in Security
    Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
    Flash Poll
    Assessing Cybersecurity Risk in Today's Enterprises
    Assessing Cybersecurity Risk in Today's Enterprises
    COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-3331
    PUBLISHED: 2021-01-27
    WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
    CVE-2021-3326
    PUBLISHED: 2021-01-27
    The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
    CVE-2021-22641
    PUBLISHED: 2021-01-27
    A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
    CVE-2021-22653
    PUBLISHED: 2021-01-27
    Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
    CVE-2021-22655
    PUBLISHED: 2021-01-27
    Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).