According to Symantec, one in 13 web requests lead to malware by tricking users into downloading and opening malicious documents. Over 90 per cent of non-browser-based attacks occur from opening files from email attachments, with Microsoft Word documents accounting for over 67 per cent of all malware attacks. While attacks through the browser remain a threat, a considerable attack surface stretched thin by the need to support legacy applications and application frameworks .
This revolutionary approach uses CPU features in HP machines to automatically isolate each supported application type and each secure browser tab in a micro-virtual machine , protecting the endpoint from malware—even from unknown zero-day attacks that traditional, signature-based antivirus protection applications might miss.
When the browser tab or Office file is closed, the entire micro-VM is automatically discarded—and the malware trapped within it is deleted. No special training or additional quarantine procedures are needed; close the browser tab or file, and the malware is gone. Because the secure browser will always open websites in their isolated micro-VMs, you can explore the Internet safely without having to learn a new browser or deal with restrictive whitelisting.
Nigeria Latest News, Nigeria Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Source: DailyPostNGR - 🏆 11. / 59 Read more »
Source: DailyPostNGR - 🏆 11. / 59 Read more »
Source: GuardianNigeria - 🏆 1. / 94 Read more »
Source: PremiumTimesng - 🏆 3. / 78 Read more »
Source: MobilePunch - 🏆 8. / 63 Read more »
Source: LeadershipNGA - 🏆 4. / 77 Read more »