Friday April 26, 2019
Home Lead Story Symantec Intr...

Symantec Introduces ‘Email Threat Isolation ‘Technology to Block Email Attacks

The technology works by creating a secure remote execution environment between users and malicious content

0
//
Symantec
Symantec. (IANS)

Cybersecurity giant Symantec Corp on Wednesday introduced a new solution based on threat isolation technology which blocks advanced email attacks on end user devices.

Named “Email Threat Isolation”, the solution helps protect users against spear phishing, credential theft, account takeover and ransomware attacks, the company said in a statement.

The email security solution with integrated threat isolation technology is designed to protect customers from the kind of sophisticated email attacks that have become more prevalent in the Cloud generation.

“Despite significant efforts by our industry to detect and block email-borne threats, messaging remains the primary vector for malware and scams within the enterprise,” said Greg Clark, Symantec CEO.

Threat Isolation Technology
Symantec Introduces Email Threat Isolation Technology. Flickr

“This revolutionary technology helps enterprises to quickly and easily isolate all malicious email content — both internal and external — to substantially reduce inherent risks within messaging applications,” Clark said.

The technology works by creating a secure remote execution environment between users and malicious content.

It sends web traffic from suspicious links to this remote environment, which confines all malicious activity, and only sends a safe visual representation of the content down to the user.

In addition, this solution can render such sites in read-only mode which prevents unsuspecting employees from disclosing sensitive information such as corporate credentials, according to Symantec.

Also Read-India Among Nations Most Prone To Cyber Attacks

“Further, because the technology is Cloud-based, organisations can be up and running quickly and easily, reducing stress on already taxed IT teams,” Clark added. (IANS)

Next Story

Two in Three Hotel Websites Leak Guest Booking Details: Report

All of the hotels did have a privacy policy but none of them mentioned this behaviour explicitly

0
Photo Courtesy: hotel.kasaulicastle.com

Two in three hotel websites leak guest booking details and allow access to their personal data to third-party sites such as advertisers and analytics companies, a new report by California-headquartered global cybersecurity company Symantec said on Thursday.

“I tested multiple websites, including more than 1,500 hotels in 54 countries, to determine how common this privacy issue is. I found that two in three or 67 per cent of these sites are inadvertently leaking booking reference codes to third-party sites such as advertisers and analytics companies,” Candid Wueest, Principal Threat Researcher, Symantec, said in a statement.

All of the hotels did have a privacy policy but none of them mentioned this behaviour explicitly.

Notably, it has been almost a year since the General Data Protection Regulation (GDPR) came into effect in Europe, but many hotels affected by this issue have been very slow to acknowledge, much less address it.

However, some reservation systems were commendable as they only revealed a numerical value and the date of the stay and did not divulge any personal information. But a majority of them leaked personal data including full name, email address, postal address, mobile phone number, last four digits of credit card, card type and expiration date, and passport number.

Marriott
A deliveryman walks near entrance of a JW Marriott hotel in Beijing, China, Jan. 11, 2018. VOA

Over half (57 per cent) of the sites that were tested send a confirmation email to customers with a direct access link to their booking. This is provided for the convenience of the customer, thus, allowing them to simply click on the link and go straight to their reservation without having to log in.

“Since the email requires a static link, HTTP POST web requests are not really an option, meaning the booking reference code and the email are passed as arguments in the URL itself.

Also Read- Astronaut Floats in Space on Mural Sporting a Gandhi Patch on Shoulder

“On its own, this would not be an issue. However, many sites directly load additional content on the same website, such as advertisements. This means that direct access is shared either directly with other resources or indirectly through the referrer field in the HTTP request,” Wueest noted.

“My tests have shown that an average of 176 requests are generated per booking, although not all these requests contain the booking details. This number indicates that the booking data could be shared quite widely,” he added. (IANS)