G06F2221/2119

NON-INTRUSIVE TECHNIQUES FOR DISCOVERING AND USING ORGANIZATIONAL RELATIONSHIPS
20170237764 · 2017-08-17 ·

The present disclosure provides techniques for calculating an entity's cybersecurity risk based on identified relationships between the entity and one or more vendors. Customer/vendor relationships may impact the cybersecurity risk for each of the parties involved because a security compromise of a downstream or upstream provider can lead to a compromise of multiple other companies. For example, if organization A uses B (e.g., a cloud service provider) to store files, and B is compromised, this may lead to organization A being compromised (e.g., the files organization A stored using B may have been compromised by the breach of B's cybersecurity). Embodiments of the present disclosure further provide a technique for calculating a cybersecurity risk score for an organization based on identified customer/vendor relationships.

Method and computing device for generating indication of malicious web resources
11431749 · 2022-08-30 · ·

A computing device for informing about malicious web resources and a method for informing about malicious web resources performed on this computing device are claimed. The claimed method includes performing operations wherein: obtaining references to a plurality of web resources; identifying malicious web resources in a specified set of web resources; establishing web resources associated with each of the identified malicious web resources; detecting malicious web resources in the identified related web resources; identifying at least one authorized entity associated with each of the identified malicious web resources; generating at least one report for at least one of the established authorized entities based on information about the detected malicious web resources associated with this authorized entity; sending each generated report to the appropriate authorized entity on the basis of the contact details of the authorized entity.

Render engine, and method of using the same, to verify data for access and/or publication via a computer system

A method and system to verify active content at a server system include receiving, at the server system a communication (e.g., an e-mail message or e-commerce listing) that includes active content that is to be made accessible via the server system. At the server system, the active content is rendered to generate rendered active content. The rendered active content presents a representation of information and processes to which an end user will be subject. At the server system, the rendered active content is verified as not being malicious.

Authentication system and method
09736150 · 2017-08-15 · ·

A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided to a peripheral memory device from a server via a secure connection. When the peripheral memory device is coupled to a computing device that attempts to establish a secure connection to the server, the secure data is used to verify that the server is authentic. Similarly, the secure data assists the server in verifying that the request to access the server is not being made by a malicious third party.

METHOD FOR PROVIDING REMOTE SERVICE CAPABLE OF MULTILINGUAL INPUT AND SERVER PERFORMING THE SAME
20220309151 · 2022-09-29 ·

Disclosed is a method of providing a security service. The method is configured to include the steps of receiving a link connectable to a web page from a device of a user, connecting to a web page corresponding to the link through a remote browser and determining a risk of the connected web page, rendering a screen of the web page to be processed in the remote browser according to the determined risk, and streaming and transmitting the rendered web page screen to provide substantially the same user experience (UX) as a browser installed in the device.

BROWSER EMULATOR DEVICE, CONSTRUCTION DEVICE, BROWSER EMULATION METHOD, BROWSER EMULATION PROGRAM, CONSTRUCTION METHOD, AND CONSTRUCTION PROGRAM

A browser emulator is caused to emulate a client environment that is arbitrary values of types and versions of an OS, a browser, and a plugin. Further, the browser emulator monitors execution of a script or a plugin. A browser emulator manager then causes the browser emulator to patrol a predetermined Web site, and accumulates, in an analysis information database, results of access to the Web site in association with information on client environments emulated upon the access to the Web site. The browser emulator manager then refers to the accumulated results of access, and identifies a Web site that causes a difference between results of access according to a difference between client environments.

SYSTEMS AND METHODS FOR AUTOMATICALLY BLOCKING THE USE OF TRACKING TOOLS

Embodiments of the present invention provide methods, apparatus, systems, computing devices, computing entities, and/or the like for permitting or blocking tracking tools used through webpages. In particular embodiments, the method involves: scanning a webpage to identify a tracking tool configured for processing personal data; determining a data destination location that is associated with the tracking tool; and generating program code configured to: determine a location associated with a user who is associated with a rendering of the webpage; determine a prohibited data destination location based on the location associated with the user; determine that the data destination location associated with the tracking tool is not the prohibited data destination location; and responsive to the data destination location associated with the tracking tool not being the prohibited data destination location, permit the tracking tool to execute.

SECURITY SERVER FOR DYNAMIC VERIFICATION OF WEB CONTENT, END USERS REMOTE DEVICE, SYSTEM COMPRISING SAID END USERS REMOTE DEVICE AND SERVER, AND METHOD IMPLEMENTED BY SAID SYSTEM

A security server for dynamic verification of web content located on a platform in the cloud or in the edge which runs artificial intelligence (AI) algorithms including a collector receiving collection of user interactions from an adapted browser of a remote to simulate content of pages loaded on the device based on user interactions from an adapted browser located on the end-user device navigating on the web and for sampling the outcome of these interactions at irregular time intervals, this sample resulting a fixed image such as JPG or PNG, a data mining and artificial intelligence (AI) algorithm relying on image processing executed while sample interval to detect object or patterns on the displayed content, a heartbeat generator generates heartbeat at regular interval and transmits at a continuous interval to the end-user's device to indicate to the adapted browser of the device it may display the content.

Systems and methods for providing user interfaces based on actions associated with untrusted emails
11240261 · 2022-02-01 · ·

The present disclosure describes a system that notifies users regarding specific user decisions with respect to solution phishing emails. The system notifies users when users perform specific actions with respect to the untrusted phishing emails. The system pauses execution of these actions and prompts the user to confirm whether to take the actions or to revert back to review the actions. In contrast from anti-ransomware technologies which are entirely in control, the system gives the user autonomy in deciding actions relating to untrusted phishing emails. The system interrupts execution of actions related to untrusted phishing emails in order to give users a choice on whether to proceed with actions.

MONITORING OF JAVASCRIPT OBJECT PROPERTIES FOR DETECTION OF WEB BROWSER SECURITY THREATS
20220272126 · 2022-08-25 ·

Detection of a security threat to a web browser by: Wrapping a suspect JavaScript code with a detection JavaScript code, wherein, when the wrapped suspect JavaScript code is executed in a web browser, the detection JavaScript code indirectly monitors access to a property of a non-writable, non-configurable JavaScript property, to detect an attempt by the suspect JavaScript code to perform a malicious action in the web browser. Executing the wrapped suspect JavaScript code in the web browser, to effect the monitoring and the detection.