Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/19/2009
03:07 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

DNSstuff Partners With Trusteer On Malware-Prevention Tool

Rapport protects transactions from being tampered with and private information from being stolen

Newburyport, MA " March 19, 2009 " DNSstuff (www.dnsstuff.com) today announced in partnership with Trusteer that it is offering Rapport, a tool that protects your transactions from being tampered with and private information from being stolen, through its website, dnsstuff.com.

Rapport is an easy-to-use browser plug-in that provides users with a secure connection to any online site they log into, protecting their most valuable online assets " login credentials. "Any tool that secures the connection between your desktop and any site you have to log into is truly a real benefit. Protecting your user credentials should be every consumer's top priority, Rapport makes that automatic! Rapport is proven, lightweight and effective," said Paul Parisi, CTO at DNSstuff.com.

Malware is growing at an alarming rate. Today, malware programs are capable of bypassing the most advanced authentication and security controls implemented by most websites. If this occurs, your most vulnerable assets are at risk including your login credentials. Rapport protects login credentials and transactions, from desktop to website, even if a computer is infected with malware.

How it works The Trusteer Rapport product secures personally identifiable information (PII) when users conduct business online with financial institutions and other goods and services providers. It acts like a vault inside a user's web browser to protect online transactions from malicious software resident on customer computers, prevents redirection to fraudulent websites, and locks down communications during transmission. Rapport protects users against the following forms of attacks: Man-in-the-browser, Man-in-the-middle, session hijacking, screen capturing and pharming.

Added layer of protection When it comes to identity fraud, even antivirus software and firewalls aren't enough. That's because criminals can easily bypass these defenses, to prey on your login details. Rapport shields your online details and safeguards your identity. It works in tandem with your antivirus and security software.

Pricing and availability DNSstuff Rapport will be available on March 19, 2009. You can download it for free and protect up to 3 websites. Pricing starts at $29 per user for unlimited site protection. Volume pricing is available by contacting [email protected]

About DNSstuff.com DNSstuff is often the company IT professionals turn to for help in configuring, monitoring and resolving email, internet and connectivity issues. These on-demand tools and alerts services reduce downtime and minimize domain vulnerability. DNSstuff solutions combine the effectiveness of command line tools with the efficiency of point tools. DNSstuff.com users are a uniquely large, knowledgeable and trusted community of IT professionals, and its resources are featured in several authoritative books on the Internet which can be found at www.dnsstuff.com.

About Trusteer Trusteer enables online businesses to secure communications with their customers over the Internet and protect personally identifiable information (PII) from a user's keyboard into the company's website. Trusteer's flagship product, Rapport, allows online banks, brokerages, healthcare providers, and retailers to protect their customers from identity theft and financial fraud. Unlike conventional approaches to web security, Rapport protects users' PII even if their computer is infected with malware including Trojans and keyloggers, or is victimized by pharming, phishing attacks. Trusteer is a privately held corporation led by former executives from Cyota/RSA Security, Imperva, and NetScreen/Juniper. For more information visit www.trusteer.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
More SolarWinds Attack Details Emerge
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/12/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).