Introduction
Quttera malicious content detection technology directly from your
Word Press dashboard!
Keep your blog malware-free with
Quttera Web Malware Scanner. Detect malware, exploits, JavaScript code obfuscation and other suspicious activity.
The plugin scans the content of your blog for web-based malware in its various formats. The data is investigated on the remote servers by the Quttera malicious content detection engines. No files will be changed on your web-site. It adressess the malware hidden behind HTML, Javascript, Dynamic HTML, AJAX, Flash, PDF, or other valid programming languages and formats.
It will help you to identify malicious code injection, malicious code obfuscation, auto-generated malicious web content, JavaScript code obfuscation, exploits and much more. Avoid your blog visitors from being infected by malware and protect your reputation.
Keep your blog safe and protect visitors from being infected by malware with
Quttera Web Malware Scanner plugin.
Search your blog content for:
- malicious code
- vulnerability exploits(shell-codes)
- JavaScript obfuscation techniques
- hidden iframes
- unconditional re-directions
- any potentially suspicious activity
Features
Quttera Web Malware Scanner is based on Quttera investigation engine. Its core is a platform with multiple non-signature based detection and analytic units which allow to identify JavaScript based attacks, security vulnerability exploits, JavaScript obfuscation techniques and JavaScript packers that are used to hide malicious content from signature/pattern identification methods.
Quttera Web Malware Scanner detects:
- Security vulnerability exploits referencing system internals(x86 architecture)
- Security vulnerability exploits referencing process internals(x86 architecture)
- Sensible sequences of CPU instructions inside text and binary files(x86 architecture)
- Hidden Java-script code generated during emulation of the original script or web page
- Suspicious Java-script containing code obfuscation or injection of hidden Java-script
- Hidden HTML elements generated during emulation of the original script or web page
- PDF files containing embedded malicious PE files
- PDF files containing hidden suspicious actions
- PDF files containing hidden suspicious elements
- PDF files containing Java-script code obfuscation
- Malformed PDF files
- Encrypted PDF files
- Unconditional redirections to external URLs
Download and Install
Download page:
WordPress Malware Scanner plugin
See "Installing Plugins" and "Manual Plugin Installation" sections at
http://codex.wordpress.org/Managing_Plugins
How it works?
Quttera Web Malware Scanner plugin interacts with Quttera's Web Investigation Server (WIS) using HTTP interface and enforce reinvestigation of specified domain. Both the hosting server name and Quttera investigation server name could be cofigured by user and are not limited by default values.
Currently we have only one investigation server so please do not change it. Web-site investigation is peformed asynchroniously and does not require from user to stay on the same page and wait for investigation result. Once "Scan my website" button is pressed, the investigation request sent to Quttera investigation server.
If user already investigated his website in last 24 hours, Quttera investigation server will retun the latest result. If last investigation request occured before 24 hours, the website will be investigated once again.
No comments:
Post a Comment