Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Nine Ball protection for Check Point Endpoint Security users

Check Point : 23 June, 2009  (New Product)
Malicious site re-direct malware will not compromise the endpoints of users of Check Point's Endpoint Security software where the exploit will be stopped
Check Point Software Technologies has announced that users of Check Point Endpoint Security are protected against Nine Ball, a multi-layered Web browser attack targeting legitimate Web sites to redirect users to malicious sites owned by the attacker.

Check Point Endpoint Security antivirus capabilities protect enterprise desktops and laptops against the malicious programs downloaded through the Nine Ball exploit, preventing the attacker from gaining access to proprietary data. The antivirus feature removes the malicious programs currently delivered through Nine Ball.

The Nine Ball attack first works by infecting a legitimate Web site, and then redirects the visiting victim to a malicious site owned by the attacker. The compromised Website, loaded with malware, checks for vulnerabilities in the browser, Microsoft Data Access Components (MDAC), AOL Super Buddy, Adobe or QuickTime software on the user's desktop, making the victim susceptible to a drive-by-download attempt. If successful, the attack will download a Trojan with a Keylogger component used to log keystrokes. Anything the victim types could be monitored and used to commit data theft, such as stealing customer data, corporate credit card numbers or passwords.

'Corporate endpoints are a vulnerable entry point for exploits and can affect an entire organization if confidential data is leaked or misused,' said Ben Khoushy, vice president of endpoint products at Check Point. 'As part of Check Point's Total Security offering, our Endpoint Security solution protects against mass compromise attacks like Nine Ball, and also provides anti-spyware and encryption capabilities.'

Check Point Endpoint Security is the first and only single agent that combines all essential components for total endpoint security including: highest-rated firewall, antivirus, anti-spyware, full disk encryption, media encryption with port protection, network access control (NAC), program control and VPN. It protects endpoints and networks while eliminating the need to deploy and manage multiple agents, reducing total cost of ownership (TCO).
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo