Patent application number | Description | Published |
20140283028 | MALICIOUS REQUEST ATTRIBUTION - Methods, apparatuses, and computer readable media for malicious request attribution are presented. For example, according to one aspect, requests for one or more records may be received from a requesting computing device. A determination may be made that the requests are of a malicious nature. Responsive to determining that the requests are of a malicious nature, one or more requests for obtaining information about the requesting computing device may be generated, and communicated to the requesting computing device. In some embodiments, at least one of the one or more requests for obtaining information about the requesting computing device may be configured to cause the requesting computing device to fail to properly render at least a portion of a web page comprising at least one of the one or more records. | 09-18-2014 |
20150052453 | Virtual Position Display and Indicators - Systems, methods and apparatuses for identifying and/or displaying an availability or virtual position of a user are provided. In some examples, a virtual position display may be provided and may include a plurality of user indicators. The user indicators may include an availability of the user. In some examples, a user may adjust a position of a user indicator. Adjustment of the user indicator closer to another user indicator may indicate an increased availability status of the user, while adjustment of the indicator away from another user indicator may indicate a decreased availability of the user. In some examples, the user indicator may include a level of activity indication received from one or more sensing devices associated with the user. | 02-19-2015 |
20150052519 | HYPERVISOR DRIVEN EMBEDDED ENDPOINT SECURITY MONITORING - Aspects of the present disclosure are directed to methods and systems of hypervisor driven embedded endpoint security monitoring. A computer implemented method may include providing one or more computer processors configured to operate a bare-metal hypervisor; launching a user OS virtual machine operatively connected to the hypervisor; launching a security virtual machine operatively connected to the hypervisor and receiving data from the security virtual machine via the hypervisor; and receiving data representative of security information from the computer processor processed by the security virtual machine. The hypervisor may include using a virtual switch for providing communications between the user OS virtual machine and the security virtual machine. The method may include using the security virtual machine to monitor malware on the user OS virtual machine. | 02-19-2015 |
20150052579 | ORGANIZATIONAL ATTRIBUTION OF USER DEVICES - A login request to access information associated with a website may be received from a user device accessing the website via a browser. A determination may be made as to whether a browser attribute of the browser, font type, or service set identifier (SSID) information is located within a database. A further determination may be made as to whether to grant access to the information associated with the website. The determination as to whether to grant access to the information associated with the website may be based at least in part on the browser attribute font type, or service set identifier (SSID) information. | 02-19-2015 |
20150052605 | MALWARE DETECTION AND COMPUTER MONITORING METHODS - A method is disclosed, where some embodiments of the method include installing at least one benign malware indicator on one or more computing devices, monitoring the one or more computing devices for the presence of the at least one benign malware indicator, and responsive to determining the benign malware indicator is no longer present, sending a notification indicating the benign malware indicator is no longer detected as present on the one or more computing devices. Other embodiments include performing an antivirus scan or identifying unauthorized software programs. An apparatus and one or more non-transitory computer-readable media storing computer-readable instructions capable of performing similar actions, the latter in conjunction with a computer executing instructions stored on the media, are also disclosed. | 02-19-2015 |
20150066763 | METHOD AND APPARATUS FOR CROSS CHANNEL MONITORING - Methods and apparatuses for detecting nefarious activity by providing to others false information and tracking the use of the false information to determine in what way unlawfully taken information is used across several banking channels are presented. An example system can be configured to introduce certain predetermined markers into account data when it is determined that a user's account has been compromised, for example, during an online banking session. In this way, when a party unlawfully takes the user's account information, that party will also copy the markers from the user's account data. Therefore, when the party attempts to use the user's account data, the party will also include the markers added to the user's account. The markers can be information that is added that does not affect the transaction so the transaction can be conducted, and the system can recognize that the transaction may be nefarious. | 03-05-2015 |
20150066989 | GRAPH DATABASE WITH ONE OR MORE INFRASTRUCTURE IMPARTED ASPECTS - Data specifying a new edge of a graph database may be received. A data store for storing the new edge may be identified from amongst a plurality of data stores utilized to store one or more portions of the graph database. Each of the plurality of data stores may be associated with a set of values corresponding to an aspect of edges of the graph database. The data store for storing the new edge may be identified based on the new edge being associated with a value corresponding to the aspect of edges of the graph database that is within a set of values corresponding to the aspect of edges of the graph database associated with the data store for storing the new edge. | 03-05-2015 |
20150067862 | MALWARE ANALYSIS METHODS AND SYSTEMS - Methods of analyzing malware and other suspicious files are presented, where some embodiments include analyzing the behavior of a first malware sample on both a virtual machine and a physical computing device, the physical device having been booted from a secondary boot source, and determining whether the behavior of the malware sample was different on the virtual machine and the physical computing device. In certain embodiments, a notification indicating that the behavior was different may be generated. In other embodiments, a malware analysis computing device that is configured to receive a base hard drive image may be networked booted, and the behavior of the malware sample on the malware analysis computing device may be analyzed. In certain embodiments, a malware-infected hard drive image may then be copied off the malware analysis computing device for further forensic analysis. | 03-05-2015 |
20150089643 | MALICIOUS REQUEST ATTRIBUTION - Methods, apparatuses, and computer readable media for malicious request attribution are presented. For example, according to one aspect, requests for one or more records may be received from a requesting computing device. A determination may be made that the requests are of a malicious nature. Responsive to determining that the requests are of a malicious nature, one or more requests for obtaining information about the requesting computing device may be generated, and communicated to the requesting computing device. In some embodiments, at least one of the one or more requests for obtaining information about the requesting computing device may be configured to cause the requesting computing device to fail to properly render at least a portion of a web page comprising at least one of the one or more records. | 03-26-2015 |