Abstract: A technique for informing an Internet site operator of potential pharming attacks includes generating pharming alerts based on mismatches between a set of expected IP addresses and IP addresses obtained from DNS servers on the Internet and filtering the generated alerts based on circumstances surrounding the generated pharming alerts. Filtering the alerts blocks less suspect pharming alerts while allowing more suspect ones to pass to the site operator, reducing the rate of false positives and better enabling the operator to focus on alerts that may present actual threats.
Abstract: Anti-pharming techniques in wireless computer networks at pre-IP state are disclosed. A user computer connecting to a wireless computer network may include an anti-pharming module configured to monitor data communications to and from a wireless access point of the wireless computer network. The anti-pharming module may be configured to determine if data communication going in a direction from the wireless access point to the user computer originated from a wireless station rather than a server configured to dynamically provide network addresses to computers connecting to the wireless computer network. The wireless station may be deemed a malicious computer perpetrating a pharming attack when it originated the data communication and is responding to a request to obtain network address previously sent by the user computer.
Abstract: A method and system for discovering domain name system (DNS) pharming, comprising: obtaining an answer to a question from two different sources; comparing the answers; determining that the technology is not suspect when the answer is the same; and determining that the technology is suspect when the answer is different.
Abstract: HTTP requests initiated from a web browser of a client computer system are proxied prior to release to a router, such as a home router. HTTP requests identifying a referrer URL corresponding to routable, public IP address and a target URL corresponding to a non-routable, private IP address are determined to be indicative of a drive-by pharming attack, and are blocked from sending to the router. HTTP requests not identifying a referrer URL corresponding to a routable, public IP address and a target URL corresponding to a non-routable, private IP address, the HTTP request are not determined to be indicative of a drive-by pharming attack, and are released for sending to the router. In some embodiments, an HTTP response received in response to a released HTTP request is proxied prior to release to the web browser. An HTTP response having content of type text/html or script is modified as indicated to prevent malicious activity and released to the web browser.
Abstract: Methods implemented by enhanced Password Manager for protecting against Pharming and Spyware comprising matching a saved record with certificate of website and withholding saved record's data if a match is not found. Further comprising, scrambling of retrieved data with a scrambling key wherein said key is synchronized with website.
Abstract: HTTP requests initiated from a web browser of a client computer system are proxied prior to release to a router, such as a home router. HTTP requests identifying a referrer URL corresponding to routable, public IP address and a target URL corresponding to a non-routable, private IP address are determined to be indicative of a drive-by pharming attack, and are blocked from sending to the router. HTTP requests not identifying a referrer URL corresponding to a routable, public IP address and a target URL corresponding to a non-routable, private IP address, the HTTP request are not determined to be indicative of a drive-by pharming attack, and are released for sending to the router. In some embodiments, an HTTP response received in response to a released HTTP request is proxied prior to release to the web browser. An HTTP response having content of type text/html or script is modified as indicated to prevent malicious activity and released to the web browser.
Abstract: Methods for detecting an attempt to perpetrate fraud on a user utilizing a client-supplied link and a client-supplied IP address from a user computer. The method ascertains a first autonomous system number (“first AS number”) from the client-supplied IP address and a second autonomous system number (“second AS number”) from the client-supplied link. If the first AS number and the second AS number are not AS group peers, a pharming attempt is detected. Alternatively or additionally, the method includes analyzing a content of a webpage that is accessed using the client-supplied IP address to ascertain an identity of an apparent owner of the webpage and ascertaining a third autonomous system number (“third AS number”) from the identity of the apparent owner of the webpage. If the first AS number and the third AS number are not AS group peers, a phishing attempt is detected.
Abstract: A variant of phishing involves subverting an Internet access point, often used for mobile computing. Malware can route user requests for bank websites into a phisher's private network, with fake bank websites (pharming). The user can have a “mobile password” at the bank. When she connects from an access point, she sends a hash, found from the password, starting at some position in it. The bank returns a hash, found from the same password, starting at another position in it. Each can verify the other. We protect both from a man in the middle attack. By hashing a web page and the mobile password, and inserting the hash into the page that is sent, the recipient can verify that the page is untampered. We use an anonymizer, external to the access point. A user pre-establishes a password with the anonymizer. At the access point, she and the anonymizer use a zero knowledge protocol to verify each other, based on the password. Then, the password encrypts communication between them.
Abstract: Protecting computer users from online frauds, such as phishing and pharming. A client computer may include a page signature extractor and a policy enforcer. The page signature extractor may encode a web page to generate its signature, which may be provided to a remote server computer for comparison with signatures of phishing pages. The client computer and the server computer may communicate using the DNS protocol. The policy enforcer may perform one or more predetermined actions when a match is found. Examples of such actions include replacing the web page with a blocking page, displaying a warning message, or both. The policy enforcer may be configured to determine if the web page is part of a phishing or pharming attack by comparing the URL of the web page to URLs of legitimate web pages.
Type:
Grant
Filed:
September 28, 2007
Date of Patent:
June 7, 2011
Assignee:
Trend Micro Incorporated
Inventors:
Chih Sheng Chen, Shr-An Su, Yi-Chan Hung
Abstract: The invention provides transgenic nonhuman mammals expressing C1 inhibitor in their milk. The C1 inhibitor is useful in treating patients with hereditary angioedema or patients requiring immunosuppression.
Type:
Application
Filed:
March 22, 2005
Publication date:
October 6, 2005
Applicant:
Pharming Intellectual Property B.V.
Inventors:
Johannes Nuijens, Henricus Van Veen, Frank Pieper, Joris Heus
Abstract: The invention relates to methods for intracellularly producing DNA segments by homologous recombination of smaller overlapping DNA fragments and transgenic mammalian cells and transgenic non-human mammals produced by such methods.
Type:
Grant
Filed:
June 5, 1995
Date of Patent:
February 24, 1998
Assignee:
Pharming B.V.
Inventors:
Robert M. Kay, Anton Berns, Paul Krimpenfort, Frank Pieper, Rein Strijker
Abstract: The invention provides methods of treating Pompe's disease using human acid alpha glucosidase. A preferred treatment regime comprises administering greater than 10 mg/kg body weight per week to a patient.
Abstract: The invention provides methods for purification of human lactoferrin from milk, especially milk of nonhuman species, and for separation of human lactoferrin from undesired macromolecular species present in the milk, including separation from nonhuman lactoferrin species.
Abstract: The invention provides methods for purification of human lactoferrin from milk, especially milk of nonhuman species, and for separation of human lactoferrin from undesired macromolecular species present in the milk, including separation from nonhuman lactoferrin species.
Abstract: The invention provides compositions containing human lactoferrin, or lactoferrin variants deleted for one or more arginine residues in the amino-terminal region of the protein (i.e., in the first basic cluster), and methods of using the compositions. The human lactoferrin, or lactoferrin variants are useful for treatment of human diseases and conditions, including inflamation.
Abstract: This invention relates to the production of recombinant proteins in mammals' milk. Particularly, this invention relates to an expression system which when transgenically incorporated into a mammal permits the female species of that mammal to produce the desired recombinant protein in or along with its milk. This invention also relates to the transgenic mammal that produces the desired recombinant product in its milk.
Abstract: The invention provides low-half life fibrinogen as a result of recombinant expression or enzymatic and chemical removal. The low-half life fibrinogen is useful in treating or effecting prophylaxis of bleeding particularly in situations of an acute nature in which a high initial dose and rapid decline to normal or below normal levels is desirable.
Type:
Application
Filed:
April 29, 2009
Publication date:
October 27, 2011
Applicant:
Pharming Intellectual Property B.V.
Inventors:
Frank Pieper, Anurag Relan, Erik Jordahl Forsberg
Abstract: The invention provides transgenic nonhuman mammals capable secreting exogenous procollagen or collagen into their milk. The mammals are healthy and capable of producing procollagen or collagen at high levels, usually in trimeric form. Suitable transgenes for incorporation into the mammals are also provided.
Type:
Application
Filed:
December 18, 2003
Publication date:
August 4, 2005
Applicants:
Pharming B.V., Cohesion Technologies, Inc.
Inventors:
Costas Karatzas, Frank Pieper, Ineke De Wit, Richard Berg, Gerard Platenburg, Paul Toman
Abstract: The invention provides methods for purification of human lactoferrin from milk, especially milk of nonhuman species, and for separation of human lactoferrin from undesired macromolecular species present in the milk, including separation from nonhuman lactoferrin species.