Monday, July 1, 2013

Various Web Browser Features and Associated Risks

It is important to understand the characteristics of a Web browser and the associated risks, because cyber villains constantly use to promote their activities and PC security challenge. You'll find it on your PC by simply injecting viruses and malware to infect the way web browsers software and they do this through the use of vulnerabilities in it.

Virus and malware authors targeted functions of Web browsers, the primary responsibility of these security incidents focus. Are discussed below, some of the features that can be exploited by cyber-criminals. Understanding the functionality of these features, you can understand how they can be used to compromise the security of your computer.
ActiveX is a technology widely used Web browser Microsoft Internet Explorer. It allows applications to partially or completely Web browser for efficient browsing and downloading of use. ActiveX components can through each page, which is available on all Windows systems, and it is provided by a Web site available for downloading object can be used. Using ActiveX technology, the traditional Web browsing has more features, but do not forget that there are also serious vulnerabilities to security incidents.

When internet users are frequent, then you must have heard the term controls. Cookies exist as files on your store data related to websites you visit and later PC. Information in connection with the websites visited by the user and the credentials to access the site stored in cookies. Cookies can only be read by the sites that created the cookie. However, session cookies are deleted when the browser is closed, but persistent cookies remain on your computer until they expire or are removed either manually reach. Because cookies can provide a variety of information on the browsing behavior and history, they are often the target of viruses and malware

JavaScript is a scripting language that is used more and more interactive by developers to create web pages. This is an important feature of Web browser, specifications that certain functions such as access to local files can be limited door.

As JavaScript, VBScript is a scripting language that is used with Microsoft Internet Explorer. It is used in Web pages to a limited extent, because it is not uniformly compatible with all browsers.

Using the scripting language such as JavaScript and VBScript, Web page authors can increase the functionality and interactivity of websites significantly. But remember that this is a double-edged sword, because it increases both the functionality and interactivity of the web page and the other side opens avenues for cyber threats.
By default, most browsers provide a script support provides the following vulnerabilities browser.

Cross-Site Scripting
Cross-site scripting, which is commonly known as XSS is a web site that the vulnerability could allow an attacker to improve his position of trust with the site allows. It is not always due to a bug in the web browser. To learn more about XSS vulnerabilities that you know to search the database of Notes vulnerability and cross-site scripting vulnerabilities.
Cross-area and cross-domain vulnerabilities
Most Web browsers use to prevent certain Safety Standards website scripts to access data in a different domain. These security features are cross-area and cross-domain vulnerability that virus writers can help address access to private data on the site.

Escape detection
Various programs antivirus, intrusion detection systems and intrusion prevention systems Protect PC for specific models of content. As soon as they can find any unknown reason they initiate protection to protect users. But these protective systems may be circumvented by the dynamic nature of programming and script in Web pages.
Mentioned above are the different functions of the Web browser and the associated risks. Among these ActiveX, VBScript and Javascirpt majorly responsible for the majority of security vulnerabilities in a browser. The best way to prevent these risks security is to disable the browser, unless they are specifically requested.

No comments:

Post a Comment


Anti Spyware Anti Trojan Elite Antivirus Apps for Android Phones Antivirus Apps for Samsung Antivirus Review Antivirus Support Avast AVG Avira Antivirus BestCrypt BitDefender Boot Sector Virus BullGuard Clamwin Classroom Spy Pro Cleanup inbox and manage emails Cloud Backup Cloud Computing Security Comodo Computer Certification Courses Conficker worm Cyber Bullying cyber security Data Protection DoctoAntivirus Downloads DR Drive Genius3 eScan Antivirus Fake Antivirus Fast PC Fat Data Recovery Firewall protecion Folder Guard Professional GFI Languard Hackers HitmanPro IDS IE antivirus Installerex IT Consultants K-Secure VPN K7 Antivirus Kaspersky Linux antivirus Loaris trojan malware Manually Virus Delete mcafee MCAfee SuperDAT Microsoft Security Essential Most Danger PC Viruses Netgate spy emergency NOD32 Norman Malware Norton Online Antivirus Panda Cloud antivirus PC Care PC Doctor Pc Resources PC Technician PC Tools Antivirus PC Virus PDA Antivirus Pop-Up Removal PrivateFirewall Protector Plus Registry Clean Remove Spyware Rootkit Virus Safe Emailing Security Shardana Antivirus Rescue Disk Smartphone security Social Network Safety spyhunter Spyware SuperantiSpyware Symantec The Cleaner 2011 Top Antivirus Top Destructive Viruses Trojan Horse Trojan Killer trust port Twitter Protection USB Security Vipre Internet Security Virus Definitions Virus Scanners VueScan Pro WEB Antivirus Website Security WinASO Registry optimizer windows 7 Windows 8 Protection Windows Vista Virus Windows.8.1 WinMend System Doctor Wireless Network Protection Zemana AntiLogger