WWW as a major source of computer security risks

Today, when Internet became the primary channel of information and entertainment, propagation of malicious software is very simple and in general based on exploitation of security vulnerabilities which are frequently discovered in popular web browsers and media viewers. According to Common Vulnerabilities and Exposures database, only in 2010 there were discovered 114 security vulnerabilities in Mozilla Firefox, 172 security vulnerabilities in Google Chrome, 49 vulnerabilities in Opera and 68 in Microsoft Internet Explorer (5,6,7,8).

Quttera supplies cloud services providing protection from web based security threats and help to keep web-surfing devices away from viruses, trojans, worms and other kinds of malicious software.

Quttera's malicious content detection services utilize cutting edge heuristic detection technologies capable to detect fully new, previously unknown security threats as well as already known threats which are spread as a part of legitimate web content included in web sites. Our technology is based on years of research and systematic investigations of web based security threats and it provides very good(high rate) capabilities in detection of JavaScript exploits, malicious PDF documents and media files that are downloaded and accessed by web browser implicitly during web surfing. Our services run on remote servers and do not require local installation.

Try our free Online Website Malware Scanner service and don't leave bad guys a chance.


More about information security

How quttera engine can be adopted by existing information security solutions?

There is no doubt that a web-based malware is an emerging security threat for websites and web users. The dynamic content has increased the delivery of sophisticated web threats that evade detection by traditional security technologies. Hackers insensibly hack web-sites by exploiting security weaknesses of hosted web applications, gain access to the hacked Web site and install malware files that further spread to mobile devices and desktop stations.

In order to improve existing identification capabilities we have developed a heuristic malicious content detection engine which is capable to recognize and protect from various kinds of web-threats. Our malicious content detection engine comprises multiple non-signature based investigation and analytic methods capable to identify JavaScript based attacks, security vulnerability exploits, JavaScript obfuscation techniques and JavaScript packers which are used to hide malicious content from signature/pattern based identification engines.

Quttera investigation engine embeds number of homemade execution emulators which penetrate investigation content and detects web-treats regardless to targeted web browser or operating system.

Current engine version is capable to recognize and detect:

  • Security vulnerability exploits referencing system internals(x86 architecture)
  • Security vulnerability exploits referencing process internals(x86 architecture)
  • Sensible sequences of CPU instructions inside text and binary files(x86 architecture)
  • Hidden Java-script code generated during emulation of the original script or web page
  • Suspicious Java-script containing code obfuscation or injection of hidden Java-script
  • Hidden HTML elements generated during emulation of the original script or web page
  • PDF files containing embedded malicious PE files
  • PDF files containing hidden suspicious actions
  • PDF files containing hidden suspicious elements
  • PDF files containing Java-script code obfuscation
  • Malformed PDF files
  • Encrypted PDF files
Quttera is designed and implemented as a generic investigation engine and it can be adopted and integrated into any information security software like:
  • Intrusion detection/prevension systems (IDS/IPS)
  • Antiviruses and malware detection tools
  • Malicious and suspicious web sites detection systems
  • Web sites investigation systems
  • Security internet suits
  • Application gateways
  • Mail servers
Quttera includes three main modules:
  • X86 emulator for emulation and detection of shellcodes and sensible malicious sequences of executable instructions
  • JavaScript emulator for emulation and detection of malicious JavaScript scripts and HTML pages
  • PDF reader emulator for detection of malicious PDF files.

Please contact us to verify how Quttera can reinforce your protection along with a solution you're, already, using.

Testimonials

Ghotit Dyslexia Software is engaged in development and sales of spelling and grammar correction software for children and adultswith dyslexia. It's important for Ghotit that parents of the kids with dyslexia to enjoy a safe browsing of our site; this is particularly important since the web-site is used as a web-store to sell our dyslexia software.

"Zero-day protection" from malware is declared by many vendors whereas only Quttera is placing a real technology to deliver this promise. Since we are software people, we are understanding the revolutionary Quttera technology with examples at Quttera blog, and we are thankful for the daily scans and protection of our web-site.

Dr. Robert Iakobashvili, CTO Ghotit Dyslexia Ltd.


Ghotit Dyslexia


Found malware on my site, janeco.ca, downloaded the Quttera plugin which gave me a breakdown of affected pages. Simply asked for the team at Quttera to look into it, they then proceeded to remove ALL Malware within a few hours of initial notification! All I can say is a BIG THANK YOU!

Christian Koriati


Commercial Cleaning Company in Montreal



Contact us to add feedback or place testimonial.


Contact details

Quttera
28 Hadar st
Holon
58210 Israel

Please contact us for additional information, feedbacks or suggestions.

For additional information:
contactus@quttera.com
For support:
support@quttera.com

  • Connect With Us
  • Facebook
  • Twitter
  • YouTube

Powered by Quttera © 2014. All rights reserved