By typing their URL address into the Attack Trace search engine, users get a glimpse into the cross section of malware that is specifically aimed at their website and what the code is written to accomplish. The Trusteer Attack Trace search engine searches for leading Trojans and other attack codes including Torpig/Sinowal
The Attack Trace search engine was developed and is constantly updated by Trusteer's research organization (http://www.trusteer.com/research), which is led by noted web security
"The amount and sophistication of malware targeting financial websites is growing at an exponential rate," said Amit Klein CTO of Trusteer and head of the company's research organization. "The Attack Trace tool gives security professionals a view into the type and number of crimeware files that are directly attacking their website and users. It provides a barometer of web threats and quantifiable evidence for making IT security investments."
About Trusteer
Trusteer enables online businesses to establish a secure communication tunnel with their customers over the Internet that stretches from user's keyboard into the company's website. Trusteer's flagship product, Rapport, allows online banks, brokerages, and retailers to protect their customers from identity theft and financial fraud. Unlike conventional approaches to Web security, Rapport protects users' confidential information even if their computer is infected with malware including Trojans and keyloggers, or is victimized by pharming, phishing attacks. Trusteer is a privately held corporation led by former executives from Cyota/RSA Security, Imperva, and NetScreen/Juniper. For more information visit www.trusteer.com
Announcements
Trusteer Releases Free Malware Search Engine For Financial
Trusteer Attack Trace provides visibility into leading trojans and threats aimed at specific Web sites
More Insights
Editors' Choice
Webinars
- How Applications Are Attacked: A Year in Application Security
- Managing Identity in the Cloud
- Expert Advice for Getting the Most from Security Orchestration, Automaton & Response Enterprise Tools
- SBOMS and the Modern Enterprise Software Supply Chain
- How Supply Chain Attacks Work -- And What You Can Do to Stop Them
Reports
White Papers
More Insights