Headline
CVE-2008-5915: IBM Security Trusteer solutions
An unspecified function in the JavaScript implementation in Google Chrome creates and exposes a “temporary footprint” when there is a current login to a web site, which makes it easier for remote attackers to trick a user into acting upon a spoofed pop-up message, aka an “in-session phishing attack.” NOTE: as of 20090116, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
Overview
Optimize both security and customer experience
IBM Security™ Trusteer® solutions help you to detect fraud, authenticate users and establish identity trust across the omnichannel customer journey. Trusteer uses cloud-based intelligence, AI and machine learning to holistically identify new and existing customers while improving the user experience. More than 500 leading organizations rely on Trusteer to help secure their customers’ digital journey and support business growth.
Benefits
Continuous digital identity assurance
Transparently identify unauthorized access and activities.
Scalable and agile cloud platform
Establish cross-organizational, actionable insights through real-time assessments.
Advanced AI and machine learning
Use intelligence services to assess risk, reduce operational costs, and improve security.
Trusteer products
IBM Security™ Trusteer® Pinpoint Detect
Outsmart account takeover attempts with AI, behavioral biometrics and machine learning.
Learn more →
IBM Security™ Trusteer® Pinpoint Assure
Help power digital transformations by seamlessly assessing the risk of new and guest digital identities.
Learn more →
IBM Security™ Trusteer® Mobile SDK
Enhance your mobile growth with real-time device and session risk assessment.
Learn more →
IBM Security™ Trusteer® Rapport
Remote workforce risks
Why Trusteer
Examine the quantified benefits*
156%
ROI driven by Trusteer, and documented in this Forrester Total Economic Impact report.
85%
rates of access takeover detection achieved with Trusteer. Join the Forrester webinar to learn more.
Trusteer resources
How can we help?
Discuss your fraud detection and digital identity trust use case with a Trusteer expert.
Footnote
* "The Total Economic Impact™ Of IBM Security Trusteer", Forrester Research, March 2020