WHAT ARE THE WEB THREATS?
Web threats (or online threats) are malware programs that can attack you when you use the Internet. These browser-based threats include a range of malicious software programs designed to infect victims' computers.
The main tool behind these browser infections is the exploit package, which provides cybercriminals with a route to infect computers that:They don't have a security
product installed which is really a risk and we should have a total
security software installed in our device.
Contains a vulnerable operating
system or commonly used application because the user has not applied the latest
updates or the software vendor needs to release a new patch
Applications and operating
systems that are targeted by online threats
Cybercriminals use virtually any
vulnerability in an operating system or an application to launch exploit-based
attacks. However, most cybercriminals develop web threats specifically
targeting the most common operating systems and applications, including the
following:
Java
Because Java is installed on more
than 3 billion devices (running on various operating systems), exploits can be
created to exploit specific Java vulnerabilities on different platforms or
operating systems.
Adobe Reader
Although Adobe Reader has been
the target of many attacks, Adobe has implemented tools to protect the program
from exploit activities. Therefore, it is becoming increasingly difficult to
create effective exploits targeting the application. Nonetheless, Adobe Reader
has remained a common goal for the past 18 months.
Windows and Internet Explorer
Active exploits still target
vulnerabilities detected in 2010, including MS10-042, in the Windows Help and
Support Center, and MS04-028, associated with improper handling of JPEG files.
Android
Cybercriminals use exploits to
gain root user privileges and thus gain virtually complete control of the
target device.
Internet security experts have
identified the most active malware programs implicated in web threats. The list
includes the following types of online threats:
Malicious websites
This identifies that these
websites using comprehensive cloud-based detection methods. Most malicious URL
detections come from websites that contain exploits.
Malicious Scripts
Hackers insert malicious scripts
into the code of legitimate websites with a vulnerable security level. These
scripts are used to launch stealth attacks in which website visitors are
unknowingly redirected to malicious online resources.
Executable PE files and scripts
Typically these:
Download and launch other
malicious software programs
They carry a load that steals the
data of bank accounts and online social networks, or they steal the user's
login and account data for other services
Trojan-Downloaders
These Trojan viruses distribute
various malicious programs on users' computers.
Exploits and Exploit Packages
Exploits
Target vulnerabilities and
attempt to avoid the attention of Internet
security software.
Adware programs
The adware is often installed
simultaneously when a user starts downloading a freeware or shareware program.
List of the top 20 malicious
programs on the Internet
In 2012 list of the most active
malware programs associated with online threats, the following 20 account for
96% of all attacks on the Web:
Position
Name *
Number of attacks
% of all attacks **
* These statistics represent the
results detected by the web-based antivirus module and have been submitted who
agreed to share their local data.
** The percentage of dedicated
users with computers running that blocked online threats.
Conclusion
To protect ourselves and our data
from online or web threats we should install a total
security software that is a must for an individual and for organizations.
Comments
Post a Comment