WEB AND IT'S THREATS

Web threats (or online threats) are malware programs that can attack you when you use the Internet. These browser-based threats include a range of malicious software programs designed to infect victims' computers.

Web threats

The main tool behind these browser infections is the exploit package, which provides cybercriminals with a route to infect computers that:

They don't have a security product installed which is really a risk and we should have a total security software installed in our device.

Contains a vulnerable operating system or commonly used application because the user has not applied the latest updates or the software vendor needs to release a new patch

Applications and operating systems that are targeted by online threats

Cybercriminals use virtually any vulnerability in an operating system or an application to launch exploit-based attacks. However, most cybercriminals develop web threats specifically targeting the most common operating systems and applications, including the following:

Java

Because Java is installed on more than 3 billion devices (running on various operating systems), exploits can be created to exploit specific Java vulnerabilities on different platforms or operating systems.

Adobe Reader

Although Adobe Reader has been the target of many attacks, Adobe has implemented tools to protect the program from exploit activities. Therefore, it is becoming increasingly difficult to create effective exploits targeting the application. Nonetheless, Adobe Reader has remained a common goal for the past 18 months.

Windows and Internet Explorer

Active exploits still target vulnerabilities detected in 2010, including MS10-042, in the Windows Help and Support Center, and MS04-028, associated with improper handling of JPEG files.

Android

Cybercriminals use exploits to gain root user privileges and thus gain virtually complete control of the target device.

Internet security experts have identified the most active malware programs implicated in web threats. The list includes the following types of online threats:

Malicious websites

This identifies that these websites using comprehensive cloud-based detection methods. Most malicious URL detections come from websites that contain exploits.

Malicious Scripts

Hackers insert malicious scripts into the code of legitimate websites with a vulnerable security level. These scripts are used to launch stealth attacks in which website visitors are unknowingly redirected to malicious online resources.

Executable PE files and scripts

Typically these:

Download and launch other malicious software programs

They carry a load that steals the data of bank accounts and online social networks, or they steal the user's login and account data for other services

Trojan-Downloaders

These Trojan viruses distribute various malicious programs on users' computers.

Exploits and Exploit Packages Exploits

Target vulnerabilities and attempt to avoid the attention of Internet security software.

Adware programs

The adware is often installed simultaneously when a user starts downloading a freeware or shareware program.

List of the top 20 malicious programs on the Internet

In 2012 list of the most active malware programs associated with online threats, the following 20 account for 96% of all attacks on the Web:

Position

Name *

Number of attacks

% of all attacks **

* These statistics represent the results detected by the web-based antivirus module and have been submitted who agreed to share their local data.

** The percentage of dedicated users with computers running that blocked online threats.

Conclusion

To protect ourselves and our data from online or web threats we should install a total security software that is a must for an individual and for organizations.

Comments

Popular posts from this blog

STOP RECEIVING EMAILS: KNOW HOW

INTERNET SECURITY AND ITS NEED

PARENTAL CONTROL IS ALL YOU NEED TO SAFE YOUR CHILD