The Web    Google
Confidence Online 2.0 Guards Against Online Identity Theft

Confidence Online 2.0 Guards Against Online Identity Theft
April 21, 2003

Security vendor WholeSecurity has released the latest version of its identity theft software.

Confidence Online 2.0 is aimed at securing remote employees accessing the network from being subject to Trojan horse attacks, known or unknown. It does this by scanning for Trojan horse behavior on the target platform such as: file management activity, keystroke logging, password grabbing, creation of new user accounts and accessing memory.

"Hackers are focusing on stealing money by stealing the identities of individuals who use their PCs to conduct transactions," says Scott Olson, senior vice president of marketing with WholeSecurity. "We provide technology that presents eavesdropping on the PC that is non-intrusive to the user."

Other features of 2.0 include: short, one-time download for installation; ability to customize the mitigation options; ability to distributed and update the product in multiple ways; and a browser-based management console to administer the product and generate reports.

The product is priced at $0 to $50 per user with volume discounts. Deal sizes range from 2,000 to 15,000 users. The company sells directly.

"Our approach is to deliver security to the PC in the model of SSL that is transparent to the user and occurs at the time the user is doing business," Olson says.

The company is generating interest from firms that have virtual private networks (VPN) and want them to be available to users without client software.

Recent attacks of the type the product is designed to prevent include the PayPal identify thefts, in which a series of email worms have been disguised as security upgrade announcements from the financial service firm. The recent attacks include links to legitimate PayPal URLs, making them more difficult to detect. The attached files when launched install programs that intercept and log keystrokes on the user's computer, in order to steal password an other information. The perpetrators have not been found.

A PayPal spokesman advised users not to follow emailed instructions that direct them to a URL other than PayPal's.

  • In the Year 2005, Will Your Anti-Spam Arsenal Be the Same?
  • Sun, Partners Develop Security Appliances
  • 1/28: Sdbot.Worm!166912 Spreading
  • 2/14: Dopbot-A Worm A Acts as IRC Bot
  • Bagle-BK Worm Downloads Code
  • Soft on the Inside
  • New China Security Fragments Wi-Fi Future
  • Botnets: Who Really ''Owns'' Your Computers?
  • 11/30: SymbOS/Skulls-B is a Trojan
  • Security Policies - Not Yet As Common As You'd Think
  • It's Time to Talk Mobile Phone Security
  • Security Camera Companies and products