Hackers never stop to steal. They tend to create new tricks and spread it across the network to infect private computers. These, are called Trojan horse or malware.
There are millions machines infected by malware or Trojan horse. FraudLabs Pro detects and highlights if the IP address has been infected by malware. An exploited machine can be controlled remotely to perform fraud transactions without leaving a trace.
How to prevent sensitive information being spy by malware and protect your browsers against exploit attacks?
How to configure malware exploit validation?
- Login to the FraudLabs Pro Merchant Control Panel.
- Click on the Rules then click Add Rule.
- Select Visitor IP under the IP Validation category.
- Select the Condition and then select Malware Exploit Record.
- Select the action you want.
- Click Add Rule and don’t forget to click Save and you are done.