Blue Ridge/Secure AppGuard Protects Users from Latest Internet Explorer ActiveX Attacks

Share Article

Users warned Video ActiveX control exploit now hosted on thousands of web sites worldwide.

I challenge analysts and reporters that cover information security issues to identify a computer protection solution that provides protection as effective as AppGuard or EdgeGuard but that is also as easy to use

Every Windows XP computer is at risk from ongoing attacks that exploit a vulnerability identified in a combination of Internet Explorer and an ActiveX control. Microsoft reports that malicious software is silently installed when users view a compromised web page and can be instructed to steal identity, passwords, credit card data, and sensitive enterprise information. In the past month alone, tens of thousands of reputable websites have reportedly been compromised to serve malicious software components such as those used in these attacks.

Computers with Blue Ridge/Secure AppGuard or Blue Ridge/Secure EdgeGuard security software:
Are Already Protected from these Attacks
May Safely View Compromised Websites
Require None of the Workarounds Urged by Microsoft
Are Protected from the Next Outbreak

The probability of the anti-virus/spyware security software found on the typical consumer or enterprise computer successfully blocking one of these attacks is less than 50%. Malware makers have become proficient in systematically attacking the fundamental weakness of these decade's old products: their dependence on malware signatures to stop attacks.

Botnets can alter the signatures of their outbound malware every 10 minutes. Because anti-virus/spyware vendors can take weeks or even months to detect, build, and distribute new signatures, cybercriminals are confident that their attacks will be undetected and successful.

Every consumer and every enterprise must look at supplementing the protection they get from their existing anti-virus/spyware computer software with something that stops these increasingly sophisticated zero-day attacks.

The technology employed by AppGuard and EdgeGuard does not rely on having malware signatures. Instead, it places applications such as Internet Explorer 'under guard' to prevent attackers from forcing applications to execute malicious code. Additionally, AppGuard and EdgeGuard stop unknown software that attempts to launch from "My Documents", "Desktop", additional hard drives, and "user space". Likewise, AppGuard and EdgeGuard prevent malware hidden on a USB device from attacking the computer it's plugged into.

"I challenge analysts and reporters that cover information security issues to identify a computer protection solution that provides protection as effective as AppGuard or EdgeGuard but that is also as easy to use", says Mike Fumai, CEO of Blue Ridge Networks.

Full protection from zero-day exploit attacks is up and running in a fraction of the time required to configure host intrusion prevention system (HIPS) software from legacy solution providers. In addition, AppGuard is a fraction of the cost and requires no user intervention to ensure malware is stopped. Neither AppGuard nor EdgeGuard require highly-paid, highly-skilled technicians to fully implement. AppGuard and EdgeGuard can be installed and fully configured by anyone that knows how to install a web browser.

Blue Ridge/Secure AppGuard is priced at $24.95 per user and is available for purchase and download today.

About Blue Ridge Networks
For over 12 years Blue Ridge Networks has helped commercial and government customers securely connect and conduct business over the most secure and cost-effective networks in the world. Our solutions have consistently enabled increased application performance and endpoint security, supported network scalability, simplified management, and reduced the total cost of doing business. Blue Ridge Networks solutions represent high standards of security as evidenced by numerous government certifications and compliance with key industry standards.

More information about our products and managed services can be found by visiting

You may also follow us on Twitter at


Share article on social media or email:

View article via:

Pdf Print

Contact Author

Mike Fumai
Visit website