TITLE

Finjan Prevents Zero-Day Exploit

PUB. DATE
August 2009
SOURCE
Database & Network Journal;Aug2009, Vol. 39 Issue 4, p26
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports on the discovery of zero-day exploit by Finjan Software Inc. It notes that the zero-day vulnerability (CVE-2009-1862) in Adobe Acrobat Reader and Flash player are exploited by cybercriminals. The exploit, which was detected by the Malicious Code Research Center of Finjan, will enable cybercriminals to download and implement malicious code on the personal computer (PC) of the victim. However, the exploit can be detected and prevented through Finjan's secure web gateway (SWG).
ACCESSION #
43926979

 

Related Articles

  • Automated inference of past action instances in digital investigations. James, Joshua; Gladyshev, Pavel // International Journal of Information Security;Jun2015, Vol. 14 Issue 3, p249 

    As the amount of digital devices suspected of containing digital evidence increases, case backlogs for digital investigations are also increasing in many organizations. To ensure timely investigation of requests, this work proposes the use of signature-based methods for automated action instance...

  • Singapore security threat landscape still plagued by known issues.  // eGov Innovation;9/2/2015, p1 

    The article reports on the information security threat in Singapore in terms of combating cybercrime through strategy, mitigation and legislation.

  • Rethink your cyber strategy. Tavakoli, Oliver // SC Magazine: For IT Security Professionals (15476693);Mar2015, Vol. 26 Issue 3, p15 

    The author reflects on the need for organizations to adopt prevention-focused information security strategies to thwart advanced persistent threats and match the complexities of the malware ecosystem.

  • Cybercrime Outranks Terrorism as Insurers' Most Feared Emerging Risk. Liebmann, Lenny // Insurance Broadcasting;11/14/2014, p1 

    A poll of insurance executives attending PCIA also found that suboptimal underwriting remains primary obstacle to corporate growth.

  • Messaging-security gateway defined.  // Network World;10/15/2007, Vol. 24 Issue 40, p48 

    The article discusses the messaging-security gateway, a firewall for electronic mail (e-mail). It is said to scan both inbound and outbound e-mail, a messaging security gateway which applies all in of the e-mail-specific protection needed to do business in a spam, virus and malwareladen world....

  • 2012 Prediction: The Year of FDSACC. McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Jan2012, Vol. 49 Issue 1, p10 

    The article presents predictions for the 2012 Finally Doing Something About CyberCrime (FDSACC), which tackles the trend in cyber security in the U.S. It asserts that the Security 500 survey that was conducted in 2011 has shown that only 19% of Security 500 computer security officers (CSOs)...

  • Is it possible to make the internet-of-things secure? Bush, Steve // Electronics Weekly;2/19/2014, Issue 2577, p12 

    The article analyzes the security concerns associated with Internet-of-things (IoT) under the Internet protocol version 6 (IPv6). It is reported that, although the IoT has enabled people to do things like creating ad-hoc home automation on their phones, it has also created security concerns like...

  • Intelligence key to protecting data against fraud and espionage threats. Ashford, Warwick // Computer Weekly;11/22/2011, p7 

    The article focuses on the importance of information security in businesses as the value of information assets increase and threats from cyber crime rise. It asserts that many of the organisations' information security is not well integrated with the entire business, which either limits the...

  • Information Security Incidents Increase While Budgets Decrease. Violino, Bob // Insurancenetworking.com;10/ 2/2014, p1 

    The compound-annual-growth rate of detected security incidents has risen 66 percent year-over-year since 2009.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics