Fraud Labs Pro – Fraud Detection Solutions: What is malware exploit validation?

21 Sep

Hackers never stop to steal. They tend to create new tricks and spread it across the network to infect private computers. These, are called Trojan horse or malware.

There are millions machines infected by malware or Trojan horse. FraudLabs Pro detects and highlights if the IP address has been infected by malware. An exploited machine can be controlled remotely to perform fraud transactions without leaving a trace.

How to prevent sensitive information being spy by malware and protect your browsers against exploit attacks?

How to configure malware exploit validation?

  1. Login to the FraudLabs Pro Merchant Control Panel.
  2. Click on the Rules then click Add Rule.

add_rules

3. Select Visitor IP under the IP Validation category.

malware_ex1

4. Select the Condition and then select Malware Exploit Record.

malware_ex2

malware_ex3

5. Select the action you want.

malware_ex4

6. Click Add Rule and don’t forget to click Save and you are done.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: