Exploit prevention in Kaspersky PURE 3.0

 

Kaspersky PURE 3.0

 
 
 
 

Exploit prevention in Kaspersky PURE 3.0

Back to "General Info"
2013 Feb 27 ID: 9553
 
 
 
 
A new functionality to prevent and block exploit actions has been added to Kaspersky PURE 3.0. This functionality protects your computer from malicious programs that use vulnerabilities in the most common applications, such as Adobe Reader, Internet Explorer, Firefox and etc. to perform their malicious actions in order to get control over computer, steal personal data and other.

Exploit Prevention functionality in Kaspersky PURE 3.0 does the following:

  • Controls executable files started from vulnerable applications and web browsers (for example, an attempt to run an executable file by a program designed for viewing documents).
  • Controls suspicious actions of vulnerable applications (for example, if the rights of a running vulnerable application are exceeded and it writes itself into the other processes’ system memory).
  • Monitors previous program starts (for example, whether the program was started by the user or by an exploit).
  • Tracks a source of a malicious code (for example, a web browser that started download of an infected file; remote web address).
  • Prevents using application vulnerabilities.

Kaspersky PURE 3.0 tracks executable files run by vulnerable applications. If Kaspersky PURE 3.0 detects an attempt to run an executable file from a vulnerable application that has not been initiated by the user, the application blocks the run (the user can select a different action to be performed upon threat detection). Information about blocking of the executable file run is logged in the Exploit Prevention report.

For maximum protection the lists of applications with detected vulnerabilities are updated together with Kaspersky PURE 3.0 anti-virus databases.

 
 
 
 
 

Configuring exploit prevention settings

 
 
 
 
Was this information helpful?
Yes No
Thank you
 

 
 

How can we improve this article?

Your feedback will be used for content improvement purposes only. If you need assistance, please contact technical support.

Submit Submit

Thank you for your feedback!

Your suggestions will help improve this article.

OK