Embodiments provide systems and methods for logging events. A computer-implemented method comprises receiving input for selecting one or more event types to receive from an event collector, receiving, based on the one or more event types, a plurality of security events from the event collector, transforming each of the plurality of security events to a standard format to generate a plurality of formatted security events and transmitting the plurality of formatted security events to a security information and event management (SIEM) server.
Embodiments of systems and methods for DNS leak prevention and protection, including protection against DNS tunneling attacks, are disclosed herein. In particular, certain embodiments include a local DNS protection agent installed on a system and an associated trusted external DNS protection server. The DNS protection agent prevents DNS leaks from applications on the system such that all DNS requests from the system are confined to requests from the DNS protection agent to the associated DNS protection server. As the DNS leak prevention provided by the DNS protection agent stops applications on the system from circumventing the DNS protection server, all DNS requests originating from the system remain under the control of the DNS protection server and thus desired DNS protection (e.g., as implemented on the DNS protection server) may be maintained. Certain embodiments prevent applications from using certain DNS security protocols, such as DoH and DoT, without going through the DNS protection agent. Embodiments are also capable of detecting and addressing DNS tunneling attacks.
Embodiments of systems and methods for DNS leak prevention and protection are disclosed herein. In particular, certain embodiments include a local DNS protection agent installed on a system and an associated trusted external DNS protection server. The DNS protection agent prevents DNS leaks from applications on the system such that all DNS requests from the system are confined to requests from the DNS protection agent to the associated DNS protection server. As the DNS leak prevention provided by the DNS protection agent stops applications on the system from circumventing the DNS protection server, all DNS requests originating from the system remain under the control of the DNS protection server and thus desired DNS protection (e.g., as implemented on the DNS protection server) may be maintained. Certain embodiments prevent applications from using certain DNS security protocols, such as DoH and DoT, without going through the DNS protection agent.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software for providing access to a cloud computing system for protecting and securing the integrity of electronic devices and computing devices configurable to connect to the internet against viruses, malware and other threats; downloadable software for facilitating the provision of secure web browsers; downloadable software for restricting access to and from undesired computers networks and websites by and to electronic devices and computing devices configurable to connect to the internet; downloadable software for classification and categorization of websites, URLs, and other internet communication objects; downloadable software for scanning, identifying, and blocking threats in electronic messages; downloadable software for analyzing and classifying information including data, applications, and networks to provide threat, security, contextual, and privacy information; downloadable software for data back-up services, electronic storage and retrieval of data and information, recovery and restoration of data; downloadable software for providing on demand computing back-up services, on-line back-up services; downloadable software for providing file reputation identification and management, internet protocol reputation identification and management, real-time indication of anti-phishing services, and threat intelligence; downloadable software for the provision of mobile security, malware detection, network analysis, and incident investigation; downloadable software for providing restoration of computing devices; downloadable software for providing administrative services related to security policy; downloadable software for providing privacy protection. Providing access to computer networks; providing access between computers and computer networks; providing access between computer networks and servers; providing access between computers and servers; telecommunications services between computer networks; telecommunications disaster recovery services; telecommunication system emergency response and recovery services. Software as a service for providing access to a cloud computing system for protecting and securing the integrity of electronic devices and computing devices configurable to connect to the internet against viruses, malware and other threats; software as a service as a service for facilitating the provision of secure web browsers; software as a service for restricting access to and from undesired computers networks and websites by and to electronic devices and computing devices configurable to connect to the internet; software as a service for classification and categorization of websites, URLs, and other internet communication objects; software as a service for scanning, identifying, and blocking threats in electronic messages; software as a service for analyzing and classifying information including data, applications, and networks to provide threat, security, contextual, and privacy information; software as a service for data back-up services, electronic storage and retrieval of data and information, recovery and restoration of data; software as a service for providing on demand computing back-up services, on-line back-up services; software as a service for providing file reputation identification and management, internet protocol reputation identification and management, real-time indication of anti-phishing services, and threat intelligence; software as a service for the provision of mobile security, malware detection, network analysis, and incident investigation; software as a service for providing restoration of computing devices; software as a service for providing administrative services related to security policy; software as a service for providing privacy protection.
Examples of the present disclosure describe systems and methods for generating dynamic sensors. In aspects, a device may be detected on a network. If the device is not recognized by the network, a generic container may be created. If the device is recognized by the network, a device-specific container may be created, and device-specific threat protection and/or a device-specific machine model may be loaded into the container. In either case, a threat intelligence model and/or an ecosystem-specific machine model may also be loaded into the container. The container may then be deployed to one or more networks. In aspects, the container may be used to analyze network traffic to sense potential threats for ecosystems comprising varying devices and topologies.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor
Examples of the present disclosure describe systems and methods of automatic inline detection based on static data. In aspects, a file being received by a recipient device may be analyzed using an inline parser. The inline parser may identify sections of the file and feature vectors may be created for the identified sections. The feature vectors may be used to calculate a score corresponding to the malicious status of the file as the information is being analyzed. If a score is determined to exceed a predetermined threshold, the file download process may be terminated. In aspects, the received files, file fragments, feature vectors and/or additional data may be collected and analyzed to build a probabilistic model used to identify potentially malicious files.
Examples of the present disclosure describe systems and methods of providing real-time scanning of IP addresses. In aspects, input may be received by a real-time IP scanning system. The system may generate one or more work orders based on the input. A scanner associated with the system may access a work order and attempt to communicate with one or more devices identified by the work order. If the attempted communication with a device is successful, a protocol analyzer may be used to provide a predefined payload to the device. If the response from the device matches an expected string, the device may be determined to be a safe and/or legitimate device. If the response from the device does not match an expected string, the device may be determined to be a malicious device.
Examples of the present disclosure describe systems and methods for identifying anomalous network behavior. In aspects, a network event may be observed network sensors. One or more characteristics may be extracted from the network event and used to construct an evidence vector. The evidence vector may be compared to a mapping of previously-identified events and/or event characteristics. The mapping may be represented as one or more clusters of expected behaviors and anomalous behaviors. The mapping may be modeled using analytic models for direction detection and magnitude detection. One or more centroids may be identified for each of the clusters. A "best fit" may be determined and scored for each of the analytic models. The scores may be fused into single binocular score and used to determine whether the evidence vector is likely to represent an anomaly.
Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software, namely, providing access to a cloud
computing system for protecting and securing the integrity
of computing devices, mobile phones, tablets, gaming
consoles, network systems, smart watches, smart cars, smart
household appliances, gps systems, in home security systems,
thermostats, smart washers, smart driers, smart dishwashers,
smart refrigerators, and other electronic devices
configurable to connect to the internet against viruses,
malware and other threats; downloadable software, for
facilitating provision of secure web browsers; downloadable
software for restricting access to and from undesired
computers networks and websites by and to computing devices,
mobile phones, tablets, gaming consoles, network systems,
smart watches, smart cars, smart household appliances, gps
systems, in home security systems, thermostats, smart
washers, smart driers, smart dishwashers, smart
refrigerators, and other electronic devices configurable to
connect to the internet; downloadable software for providing
restoration of computing devices, mobile phones, tablets,
gaming consoles, network systems, smart watches, smart cars,
smart household appliances, gps systems, in home security
systems, thermostats, smart washers, smart driers, smart
dishwashers, smart refrigerators, and other electronic
devices configurable to connect to the internet to a prior
state; downloadable software for providing administrative
services over policy and updates; downloadable software for
providing privacy protection; downloadable computer software
for providing privacy protection. Network management services; network optimisation services;
outsourcing; on-line data processing services; database
management; advisory, information and consultancy services
relating to all the aforesaid services; optimisation of
information technology applications. Providing access to computer networks; providing access
between computers and computer networks; providing access
between computer networks and servers; providing access
between computers and servers; telecommunications services
between computer networks; transmission of data;
telecommunications disaster recovery services;
telecommunication system emergency response and recovery
services; advisory and consultancy services relating to
telecommunications; advisory services relating to providing
remote computer hardware access; advisory services relating
to providing remote computer software access; advisory,
information and consultancy services relating to all the
aforesaid services; providing access to a cloud computing
system for protecting and securing the integrity of
computing devices, mobile phones, tablets, gaming consoles,
network systems, smart watches, smart cars, smart household
appliances, gps systems, in home security systems,
thermostats, smart washers, smart driers, smart dishwashers,
smart refrigerators, and other electronic devices
configurable to connect to the internet against viruses,
malware and other threats. Computer services, namely, providing a cloud computing
system comprising servers and software for protecting and
securing the integrity of computing devices, mobile phones,
tablets, gaming consoles, network systems, smart watches,
smart cars, smart household appliances, gps systems, in home
security systems, thermostats, smart washers, smart driers,
smart dishwashers, smart refrigerators, and other electronic
devices configurable to connect to the internet against
viruses, malware and other threats; computer services,
namely facilitating provision of secure web browsers;
computer security services, namely, restricting access to
and from undesired computers networks and websites by and to
computing devices, mobile phones, tablets, gaming consoles,
network systems, smart watches, smart cars, smart household
appliances, gps systems, in home security systems,
thermostats, smart washers, smart driers, smart dishwashers,
smart refrigerators, and other electronic devices
configurable to connect to the internet; computer security
services, namely, providing restoration of computing
devices, mobile phones, tablets, gaming consoles, network
systems, smart watches, smart cars, smart household
appliances, gps systems, in home security systems,
thermostats, smart washers, smart driers, smart dishwashers,
smart refrigerators, and other electronic devices
configurable to connect to the internet to a prior state;
computer services, namely, provision of administrative
services over policy and updates; computer services, namely,
providing privacy protection; computer services, namely,
analyzing and classifying information including data,
applications, and networks to provide threat, security,
contextual, and privacy information; computer services,
namely, analyzing and classifying information including
data, applications, and networks to provide threat,
security, contextual, and privacy information; data storage;
data back-up services; electronic storage and retrieval of
data and information; recovery and restoration of data;
providing on demand computing services; on-line back-up
services.
A firewall monitors network activity and stores information about that network activity in a network activity log. The network activity is analyzed to identify a potential threat. The potential threat is further analyzed to identify other potential threats that are related to the potential threat, and are likely to pose a future risk to a protected network. A block list is updated to include the potential threat and the other potential threats to protect the protected network from the potential threat and the other potential threats.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software, namely, providing access to a cloud
computing system for protecting and securing the integrity
of computing devices, mobile phones, tablets, gaming
consoles, network systems, smart watches, smart cars, smart
household appliances, gps systems, in home security systems,
thermostats, smart washers, smart driers, smart dishwashers,
smart refrigerators, and other electronic devices
configurable to connect to the internet against viruses,
malware and other threats; downloadable software, for
facilitating provision of secure web browsers; downloadable
software for restricting access to and from undesired
computers networks and websites by and to computing devices,
mobile phones, tablets, gaming consoles, network systems,
smart watches, smart cars, smart household appliances, gps
systems, in home security systems, thermostats, smart
washers, smart driers, smart dishwashers, smart
refrigerators, and other electronic devices configurable to
connect to the internet; downloadable software for providing
restoration of computing devices, mobile phones, tablets,
gaming consoles, network systems, smart watches, smart cars,
smart household appliances, gps systems, in home security
systems, thermostats, smart washers, smart driers, smart
dishwashers, smart refrigerators, and other electronic
devices configurable to connect to the internet to a prior
state; downloadable software for providing administrative
services over policy and updates; downloadable software for
providing privacy protection; downloadable computer software
for providing privacy protection. Network management services; network optimisation services;
outsourcing; on-line data processing services; database
management; advisory, information and consultancy services
relating to all the aforesaid services; optimisation of
information technology applications. Providing access to computer networks; providing access
between computers and computer networks; providing access
between computer networks and servers; providing access
between computers and servers; telecommunications services
between computer networks; transmission of data;
telecommunications disaster recovery services;
telecommunication system emergency response and recovery
services; advisory and consultancy services relating to
telecommunications; advisory services relating to providing
remote computer hardware access; advisory services relating
to providing remote computer software access; advisory,
information and consultancy services relating to all the
aforesaid services; providing access to a cloud computing
system for protecting and securing the integrity of
computing devices, mobile phones, tablets, gaming consoles,
network systems, smart watches, smart cars, smart household
appliances, gps systems, in home security systems,
thermostats, smart washers, smart driers, smart dishwashers,
smart refrigerators, and other electronic devices
configurable to connect to the internet against viruses,
malware and other threats. Computer services, namely, providing a cloud computing
system comprising servers and software for protecting and
securing the integrity of computing devices, mobile phones,
tablets, gaming consoles, network systems, smart watches,
smart cars, smart household appliances, gps systems, in home
security systems, thermostats, smart washers, smart driers,
smart dishwashers, smart refrigerators, and other electronic
devices configurable to connect to the internet against
viruses, malware and other threats; computer services,
namely facilitating provision of secure web browsers;
computer security services, namely, restricting access to
and from undesired computers networks and websites by and to
computing devices, mobile phones, tablets, gaming consoles,
network systems, smart watches, smart cars, smart household
appliances, gps systems, in home security systems,
thermostats, smart washers, smart driers, smart dishwashers,
smart refrigerators, and other electronic devices
configurable to connect to the internet; computer security
services, namely, providing restoration of computing
devices, mobile phones, tablets, gaming consoles, network
systems, smart watches, smart cars, smart household
appliances, gps systems, in home security systems,
thermostats, smart washers, smart driers, smart dishwashers,
smart refrigerators, and other electronic devices
configurable to connect to the internet to a prior state;
computer services, namely, provision of administrative
services over policy and updates; computer services, namely,
providing privacy protection; computer services, namely,
analyzing and classifying information including data,
applications, and networks to provide threat, security,
contextual, and privacy information; computer services,
namely, analyzing and classifying information including
data, applications, and networks to provide threat,
security, contextual, and privacy information; data storage;
data back-up services; electronic storage and retrieval of
data and information; recovery and restoration of data;
providing on demand computing services; on-line back-up
services.
Embodiments disclosed herein relate to systems and methods for providing a smart cache. In embodiments, a variable time to live (TTL) may be calculated and associated with data as it is stored in a cache. The variable TTL may be calculated based upon reputation and/or category information related to the source of the data. The reputation and/or category information may include TTL modifiers for adjusting the TTL for data from a particular data source that is stored in the cache. In further embodiments, a feedback method may be employed to update reputation and/or category information for a particular data source.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable software to provide access to a cloud computing system for protecting and securing the integrity of computing devices, namely mobile phones, tablets, gaming consoles, network systems, namely smart home electronic computer network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices, namely tablet computers, laptop computers, smart phones and digital media players, namely digital audiotape players, digital music players, digital compact disk players and digital video players, configurable to connect to the internet against viruses, malware and other threats; Downloadable software, for facilitating provision of secure web browsers; Downloadable software for restricting access to and from undesired computers networks and websites by and to computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet; Downloadable software for providing restoration of computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet to a prior state; Downloadable software for providing administrative services over policy and updates, namely, providing computer system analysis and updating of computer software; Downloadable computer software for use in protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software. (1) Management of computer networks for business purposes, namely, optimising use of computer hardware, computer software, information technology applications, and computer networks; Online data processing services, namely updating, input, collection and systemization of computerized data, namely suspected security threats, suspected security attacks, firewall data, and data relating to the overall health and security of the computer network, and calculations; database management; advisory, information and consultancy services relating to all the aforesaid services in the field of computerized data storage and retrieval.
(2) Providing access to computer networks over telecommunications networks; providing access between computers and computer networks over telecommunications networks; providing access between computer networks and servers over telecommunications networks; providing access between computers and servers over telecommunications networks; electronic transmission of data for others via computer terminals over telecommunications networks; advisory, information and consultancy services relating to all the aforesaid services in the field of computerized data storage and retrieval.
(3) Computer services, namely, providing a virtual cloud computing system through cloud computing for others comprising virtual application servers and software for protecting and securing the integrity of computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet against viruses, malware and other threats; Computer services, namely facilitating provision of secure web browsers; Computer security services, namely, restricting access to and from undesired computers networks and websites by and to computing devices, namely phones, cellular phones, smartphones, tablets, computers, mobile phones, tablets, gaming consoles, network systems, namely smart home electronic computer network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices, namely tablet computers, laptop computers, smart phones and digital media players, namely digital audiotape players, digital music players, digital compact disk players and digital video players, configurable to connect to the internet; Computer security services, namely, providing restoration of computing devices, namely phones, cellular phones, smartphones, tablets, computers, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices, namely tablet computers, laptop computers, smart phones and digital media players, namely digital audiotape players, digital music players, digital compact disk players and digital video players configurable to connect to the internet to a prior state.
(4) Computer services, namely, provision of administrative services over policy and updates namely, providing computer system analysis and updating of computer software; Computer services, namely, protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software; computer services, namely, analyzing and classifying computerized data, software applications, and computer networks to provide threat, security, contextual and privacy information.
(5) Computer network management services; computer network optimisation services; Online data processing services, namely updating, input, collection and systemization of computerized data, namely suspected security threats, suspected security attacks, firewall data, and data relating to the overall health and security of the computer network, and calculations; database management; providing data storage space on virtual storage media; data back-up services; electronic storage and retrieval of computer data and information; advisory, information and consultancy services in the field of computerized data storage and retrieval.
(6) Providing access to computer networks; providing access between computers and computer networks; providing access between computer networks and servers; providing access between computers and servers; telecommunications services between computer networks; transmission of data for others via computer terminals; telecommunications disaster recovery services in the field of electronic data and computer systems networks; recovery and restoration of computer hard drive data; optimisation of information technology applications; advisory and consultancy services in the field of computer network management services and protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software; on-line back-up services, namely, remote storage service for archiving databases, images and other electronic data, remote back-up services for computer hard drive data and remote back-up services for computer networks; advisory services in the field of remote access of computer hardware; advisory services in the field of remote access of computer software; advisory, information and consultancy services in the field of computerized data storage and retrieval.
(7) Computer services, namely, providing a cloud computing system comprising servers and software for protecting and securing the integrity of computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet against viruses, malware and other threats; Computer services, namely facilitating provision of secure web browsers; Computer security services, namely, restricting access to and from undesired computers networks and websites by and to computing devices, namely phones, cellular phones, smartphones, tablets, computers, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices, namely tablet computers, laptop computers, smart phones and digital media players, namely digital audiotape players, digital music players, digital compact disk players and digital video players, configurable to connect to the internet; Computer security services, namely, providing restoration of computing devices, namely phones, cellular phones, smartphones, tablets, computers, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices, namely tablet computers, laptop computers, smart phones and digital media players, namely digital audiotape players, digital music players, digital compact players and digital video players; Computer network management services; computer network optimisation services; advisory, information and consultancy services in the field of computerized data storage and retrieval; telecommunications disaster recovery services in the field of electronic data and computer systems networks; recovery and restoration of computer hard drive data; management of computer networks, including optimising use of computer hardware, computer software, information technology applications, and computer networks; advisory and consultancy services in the field of computer network management services and protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software; advisory services in the field of remote access to computer hardware; advisory services in the field of remote access of computer software; advisory, information and consultancy services in the field of computerized data storage and retrieval; Computer services, namely, provision of administrative services over policy and updates, namely, providing computer system analysis and updating of computer software; Computer services, namely, protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software; protection; computer services, namely, analyzing and classifying computerized data, software applications, and computer networks to provide threat, security, contextual, and privacy information configurable to connect to the internet to a prior state.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable software to provide access to a cloud computing system for protecting and securing the integrity of computing devices namely mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; Downloadable software, for facilitating provision of secure web browsers; downloadable software for restricting access to and from undesired computers networks and websites by and to computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the internet; Downloadable software for providing restoration of computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the internet to a prior state; Downloadable software for providing administrative services over policy and updates, namely, providing computer system analysis and updating of computer software; Downloadable computer software for use in protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software; downloadable computer software for use in protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software (1) Database management; Online data processing services, namely updating, input, collection and systemisation of computerised data, namely suspected security threats, suspected security attacks, firewall data, and data relating to the overall health and security of the computer network, and calculations;
(2) Providing access to a global computer network; Telecommunications services, namely transmission of data in the nature of suspected security threats, suspected security attacks, firewall data, and data relating to the overall health and security of the computer network, between local area computer networks, global computer networks and wireless local area networks; Electronic transmission for others of data, namely suspected security threats, suspected security attacks, firewall data, and data relating to the overall health and security of the computer network, via computer terminals over telecommunications networks; Advisory services in the field of remote access of computer hardware; Advisory services in the field of remote access of computer software;
(3) Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Consultancy services in the field of security for computers and computer networks; Computer services, namely, providing a cloud computing system comprising servers and software for protecting and securing the integrity of computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the internet; Computer network security services; Computer security services, namely, restricting and controlling access of users of computing resources for computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet; Computer security services, namely, providing restoration of computing devices, mobile phones, tablets, gaming consoles, network systems to a prior state, smart watches, smart cars, smart household appliances, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet Computer services, namely, provision of administrative services over policy and updates, namely providing computer system analysis and updating of computer software; computer services namely, analyzing and classifying data, software applications, and computer networks to provide threat, security, contextual and privacy information; Management of computer networks for others; Computer network optimisation services, namely, monitoring, managing, and improving network performance; Advisory, information and consultancy services in the field of computerised data storage and retrieval, computer data security, computer network security, computer network configuration, computer network management and computer network optimisation; Providing data storage space on virtual storage media; Data backup services; Electronic storage of data, namely, archiving business documents, personal documents and corporate documents and cloud computing provider services for general storage of data; Software as a service (saas) services featuring non-downloadable data retrieval software; Advisory, information and consultancy services in the field of data storage and retrieval; Telecommunications disaster recovery services in the field of electronic data and computer systems networks; Recovery and restoration of computer hard drive data; Management of computer networks, namely, optimising use of computer hardware, computer software, information technology applications, and computer networks; Advisory and consultancy services in the field of computer network management services and protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the Internet, namely encryption, monitoring, and access restriction software; Online backup services, namely remote storage service for archiving databases, images and other electronic data, remote back-up services for computer hard drive data and remote back-up services for computer networks; Computer security services, namely protecting the privacy and security enforcing, restricting and controlling access privileges of users of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the Internet, namely, encryption, monitoring; Software as a service (saas) services featuring non-downloadable software for computer network security; Administration of user rights in computer networks; Controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Providing temporary use of on-line non downloadable operating software for accessing and using a cloud computing network; Cloud computing services, namely computing services to enable network integrating computer hardware and software for dynamic provisioning of computer resources;
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Providing access to computer networks over telecommunications networks; providing access between computers and computer networks over telecommunications networks; providing access between computer networks and servers over telecommunications networks; providing access between computers and servers over telecommunications networks; electronic transmission of data over telecommunications networks; advisory and consultancy services relating to communications between computers over telecommunications networks; advisory services relating to providing remote access of computer hardware over telecommunications networks; advisory services relating to providing remote access of computer software over telecommunication networks; advisory, information and consultancy services relating to all the aforesaid services Downloadable computer software for providing privacy protection management of computer networks for business purposes, namely, optimising use of computer hardware, computer software, information technology applications, and computer networks; outsourcing; on-line data processing services; database management; advisory, information and consultancy services relating to all the aforesaid services Computer services, namely, providing privacy protection by identifying and blocking threats to privacy by restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities Computer services, namely, monitoring of computer systems and computer networks for security purposes that involves analyzing and classifying IT information including data, applications, and networks all being part of the process of monitoring of computer systems for security purposes; Computer services, namely, facilitating provision of secure web browsers by monitoring and analyzing threats for security purposes
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software, namely, for providing access to a cloud computing system for protecting and securing the integrity of computing devices, network systems, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; Downloadable software for restricting access to and from undesired computers networks and websites by and to computing devices, network systems, and other electronic devices configurable to connect to the internet Computer services, namely, providing access to a cloud computing system for protecting and securing the integrity of computing devices, network systems. and other electronic devices configurable to connect to the internet against viruses, malware and other threats; Computer security services, namely, restricting access to and from undesired computers networks and websites by and to computing devices, network systems, and other electronic devices configurable to connect to the internet
18.
DETECTING AND PREVENTING EXECUTION OF SOFTWARE EXPLOITS
In non-limiting examples, anti-exploit systems and methods described herein monitor a memory space of a process for execution of functions. Stack walk processing is executed upon invocation of one of the functions in the monitored memory space. During execution of the stack walk processing, at least one memory check is performed to detect suspicious behavior. An alert of suspicious behavior is triggered when the performing of the memory check detects at least one of: code execution attempted from non-executable memory, identification of an invalid base pointer, identification of an invalid stack return address, attempted execution of a return-oriented programming technique, the base pointer is outside a current thread stack, and a return address is detected as being inside a virtual memory area. If an alert of suspicious behavior is triggered, execution of a payload is prevented for the invoked function.
Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an action of a first object acting on a target. The object, the event, and the target are then correlated to at least one originating object such that an audit trail for each individual event is created. A global perspective indicating an age, popularity, a determination as to whether the object may be malware, and IP/URL information associated with the event may then be applied to at least one of the object, the event, the target, and the originating object. A priority may then be determined and assigned to the event based on at least the global perspective. An event line containing event information is then transmitted to an end recipient where the information may be heuristically displayed.
Methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system are disclosed. An exemplary method includes receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.
A phishing classification model that detects a phishing website based on one or more feature vectors for the website is provided. The phishing classification model may operate on a server and may further select a website, generate a feature vector for a landing page of the website, create a feature vector for every iframe that is a descendent of the landing page, and derive a final feature vector from the feature vectors of the landing page and the descendent iframe pages. Further, machine learning techniques may be applied to generate, or train, a classification model based upon one or more known phishing websites. Based on the feature vector, the classification modeler may classify a website as either a phishing website or as a non-phishing website. Feedback in the form of human verification may further be incorporated.
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 29/06 - Communication control; Communication processing characterised by a protocol
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Computer security services, namely, restricting access to and from undesired computers, networks and websites by and to computers, networks and mobile electronic devices; Computer services, namely, scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks and mobile electronic devices; Computer virus, malware and spyware protection services; Computer security services, namely scanning and testing of computers, networks and mobile electronic devices to assess information security vulnerability; Computer services, namely providing information regarding risks and vulnerabilities for computers, networks and mobile electronic devices; Computer services, namely providing online non-downloadable software to facilitate the management and reporting of data collected from computers, networks and mobile electronic devices; Remote online backup of computer data; Technical support services, namely, troubleshooting of computer software and network problems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Software for protecting and securing the integrity of computing devices, mobile phones and network systems (1) Computer services, namely providing a cloud computer system comprising servers and software for protecting and securing the integrity of computing devices, mobile phones and network systems against viruses, malware and other threats.
In one aspect, a method of classifying a computer object as malware includes at a base computer (3), receiving data about a computer object from each of plural remote computers (2) on which the object or similar objects are stored and or processed. The base computer (3) comprises plural threat servers (62) arranged to receive said data from the plural remote computers (2) and apply rules and or heuristics against that data in real time to determine whether or not said object is malware and to communicate said determination to the remote computers (2). The base computer (3) comprises at least one central server (74) in communication with the threat servers (62) and arranged to receive said data about objects from the threat servers (62) to maintain a master database (71, 72, 73) of data received about objects from all of the threat servers (62).
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software for protecting and securing the integrity of computing devices and network systems. Providing temporary use of on-line non-downloadable software for protecting and securing the integrity of computing devices and network systems.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software for protecting and securing the integrity of computing devices and network systems. Providing temporary use of on-line non-downloadable software for protecting and securing the integrity of computing devices and network systems.
Systems, methods and non-transitory, tangible computer readable storage mediums encoded with processor readable instructions to scan files for malware are disclosed. An exemplary method includes writing, via a communication pathway, a first file to a storage medium that is utilized by the computer, requesting access to the first file so as to enable the first file to be scanned for malware, and delaying, when the first file resides on the storage medium, access to the first file while there is at least one I/O operation relative to the storage medium that has a higher priority level than a priority level of the request to access the first file. In addition, except to enable the first file to be scanned for malware, access to the first file is prevented until the first file has been scanned for malware.
Business services, namely, distributorship services in the field of computer software, telephone order-taking services for others, business lead generation services, order fulfillment, business sales projections consultation, supply chain management, work-in-process management, inventory management, strategic planning management, sales promotions, customer service in the field of computer software, return management, namely, management of returned merchandise, credit card registration, accounting and managing telecommunications networks for others, namely, managing telephone service for other carriers, all of the aforementioned services for distributors, resellers, partners, suppliers, intermediaries, third-party service providers, and customers
09 - Scientific and electric apparatus and instruments
Goods & Services
Computer software for monitoring the activities of a
computer user, preventing the execution of unauthorized
programs, and deterring access to offensive content on the
Internet; computer software in the field of security to
enable monitoring, securing and protection of computer
networks, namely software that scans for online threats to
monitor, secure and protect computer networks and
applications by restricting access to and by computer
networks to and of undesired viruses, threats, spyware
downloads and communication, phishing, worms and other
potentially threatening computer code; computer software for
providing security features to detect, identify, block and
delete Trojan horse programs, adware programs, system
monitor and other spyware programs; computer software
designed to remove by-products inherently created from
'surfing' the Internet; anti-virus software.
In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of : executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
09 - Scientific and electric apparatus and instruments
Goods & Services
Computer software, namely, computer software for providing
security features to detect, identify, block and delete
Trojan horse programs, adware programs, system monitor and
other spyware programs.
09 - Scientific and electric apparatus and instruments
Goods & Services
Computer software for use in protecting the privacy and
security of personal computers, namely encryption,
monitoring, and access restriction software, and computer
software for use in enhancing the use of a global computer
network, namely modem connection acceleration and file
management software.
09 - Scientific and electric apparatus and instruments
Goods & Services
(1) Computer software for use in protecting the privacy and security of personal computers, namely encryption, monitoring, and access restriction software, and computer software for use in enhancing the use of a global computer network, namely modem connection acceleration and file management software.
09 - Scientific and electric apparatus and instruments
Goods & Services
(1) Computer software, namely computer software for providing security features to detect, identify, block and delete Trojan horse programs, adware programs, system monitor and other spyware programs.