PaulDotCom mailing list archives
Re: How to detect and prevent man-in-the-browser and phishing attacks?
From: Arch Angel <arch3angel () gmail com>
Date: Fri, 04 Jan 2013 19:47:05 -0500
How will this affect users who run things such as no-script to block JavaScript from running?
Will it prevent the use of the website all together or provide a warning, etc..
That could potentially lead to many false positives or alerts to your staff (in relationship to the anti-trojan portion)
As far as the vendor I have no experience with them but I would be asking a great deal of questions surrounding the above mentioned items and what Allison mentioned regarding the potential of bypassing the solution all together.
-- Thank you, Robert Miller http://www.armoredpackets.com Twitter: @arch3angel On 1/2/13 11:15 PM, allison nixon wrote:
For the anti phishing/pharming protection, the concept seems pretty easy to implement without buying a product. Probably not worth it unless it's cheap and you don't have people to spare for projects.For the anti trojan protection, the idea of detecting infected users browsing your site is interesting. I have no idea if it's well implemented. The idea has potential. their claim that their soft keyboard will protect against malware is bunk though. If versafe achieves any measure of success I guarantee you it will not.On Wed, Jan 2, 2013 at 6:54 PM, Brian Erdelyi <brian_erdelyi () yahoo com <mailto:brian_erdelyi () yahoo com>> wrote:Happy New Year. How to detect and prevent man-in-the-browser attacks like those involved in "High roller" and "Euro Grabber"? I'm evaluating Versafe's anti-trojan and anti-phishing technologies and would appreciate feedback from anyone using their products or something similar. For the anti-trojan protection Versafe embeds Javascript code on our wensite that is transparently distributed and executed by every visitor of our site. This javascript is capable of scanning the browser content for suspicious activity common to man-in-the-browser attacks. For the anti-phishing protection Versafe embeds javascript code on our website. If this code were copied to another website, the javascript would detect this and send an alert back to us. I'm still sceptical of this because a savvy attacker could delete this javascript code from the phished site before it generates the alert. Is anyone familiar with these technologies? Any suggestions for solutions from other vendors? Brian _______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com <mailto:Pauldotcom () mail pauldotcom com> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com -- _________________________________ Note to self: Pillage BEFORE burning. _______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- How to detect and prevent man-in-the-browser and phishing attacks? Brian Erdelyi (Jan 02)
- Re: How to detect and prevent man-in-the-browser and phishing attacks? allison nixon (Jan 02)
- Re: How to detect and prevent man-in-the-browser and phishing attacks? Arch Angel (Jan 04)
- Re: How to detect and prevent man-in-the-browser and phishing attacks? allison nixon (Jan 02)