Malcovery® Security Threat Intelligence Links Attacks to Unsafe Webservers
New White Paper Shows How To Prevent DDOS Attacks By Blocking Phish And Malware Hosts
Pittsburgh, PA and Birmingham, AL (PRWEB) November 12, 2013
Malcovery®, the leader in delivering actionable intelligence that can be applied to neutralize the threats and actions by cyber criminals in the areas of phishing, spam and malware, today announced the release of a new white paper that details how its technologies and services can prevent (or limit or reduce) DDOS attacks by blocking the malware and phishing sites that Malcovery knows about.
“As we consider the implications of this information, we conclude that a new urgency may be in order. ’ stated Gary Warner, Chief Technology Officer (CTO) and cofounder of Malcovery Security. “Using threat intelligence from Malcovery, we can easily identify which compromised computers are being compromised for the first time and which have been compromised repeatedly, even dozens or hundreds of times. As a ‘network defender’ considers the appropriate stance towards a new threat to his or her network, we hope that this form of valuable cyber intelligence will become part of the threatscape and be used to drive change in the behavior of website owners and hosting companies.”
The whitepaper can be downloaded at http://info.malcovery.com/how-to-prevent-ddos-attacks
Malcovery Security receives and analyzes more than a million spam messages each day from a wide variety of sources. With its patented and patent-pending algorithms, Malcovery analyzes the spam on a number of factors and watches for "emerging threats" in the form of email messages that contain links to malicious websites or that contain malicious attachments. Once a new threat cluster is identified in the spam, characteristics about the malicious messages and the associated malware are documented.
In a recent article published by tech magazine TechRepublic about Malcovery, the company was dubbed ‘The company spammers and phishers hate’ due to its unique approach to fighting phishing and malicious spam. http://www.techrepublic.com/blog/it-security/malcovery-security-the-company-spammers-and-phishers-hate/
Malcovery was launched last year as a result of an exclusive worldwide license with the University of Alabama at Birmingham (UAB) and based on research conducted at the UAB Center for Information Assurance and Joint Forensics Research (CIA|JFR). The company has quickly gained commercial success with enterprise customers such as eBay, Facebook, IBM, VISA, Citi, Carnegie Mellon's CERT, and LinkedIn. Key partners and resellers include IBM, Agari, Internet Identity (IID), PPMA, and Bishop Technologies.
About Malcovery® Security
Malcovery Security is the leading provider of actionable cyber security intelligence and forensic analysis, delivered through software and services that target cyber criminals and their activities. The company's patented and patent-pending technology provides the ability to identify the root sources of cybercrime attacks (servers, perpetrators, locations, etc.), delivering rich actionable intelligence information about cross-brand attacks and targeted attacks, as well as advanced notification of emerging email-based threats.
Unlike services that serve only as a reactive response to these attacks today—services that simply address the symptoms but cannot provide the intelligence to actually stop the cybercriminal—Malcovery Security’s solutions provide the unique intelligence required to respond effectively to attacks on customers’ brands, to disrupt phishing activities and successfully prosecute cybercriminals.
Malcovery Security has offices in Pittsburgh, PA and Birmingham, AL. For more information, please visit http://www.Malcovery.com or connect with Malcovery on Facebook (facebook.com/malcovery), Twitter (@malcovery), and LinkedIn (http://www.linkedin.com/company/malcovery-security).
Editor’s Note: Malcovery® is a registered trademark. ‘Identify the Source. Stop the Threat’ TM is a trademark of Malcovery Security, LLC. All other trademarks mentioned herein are the protected properties of their respective owners.
For the original version on PRWeb visit: http://www.prweb.com/releases/2013/11/prweb11320917.htm