SlideShare a Scribd company logo
Your computer
vulnerabilities
ONLINE THREATS
JULY MONTH FOCUS ON THE
THREAT: BROWSER ATTACKS
A New Security Series program for Evoke: Laws-of-Vulnerabilities
BROWSER EXPLOITS
• Adware
• Internet fraud
• Malware
• Phishing
• Spam
• Spyware
• --------AND
Don’t get shocked.
As long as you do not LISTEN to
IT Security recommendations, you are
also part of it
Where do browser exploits come
from?
• When there is a weakness in your browser or
if browser security is set low, vulnerabilities
can be exploited by cyber crooks.
• For example, ActiveX scripts could install by
themselves which can be used to change
policies and change a program to make its
removal difficult.
• Users can be tricked into downloading and
installing a hijack themselves.
• Some browser exploits come in the form of an
error report that appears to be from the user's
own PC.
• Malicious websites can give instructions to
install a particular plug-in to view the site
correctly and others make the user believe
they are getting a browser enhancement or a
system update.
Bogus Alert
Bogus Alert
Bogus Alert
Bogus Alert
Bogus Alert
Bogus Alert
“Browser Pop-Ups!”
– Pop-up ads is classified as a malignant adware
program which silently get sneaked and produces
numerous malevolent activities to make it corrupt
as well as unusable.
– It will block your IP address and utilize all your
system resources to make your system unusable.
Bundled Software along with
Browsers is a potential threat
That was “ Magneto”
• So do not install Browsers as part of bundled
downloads.
• Example:
– When you install Adobe Reader they offer Chrome
Download.
– And When you are installing Chrome, they offer
“Magneto” installation.
– These CHAINED Bundles are highly Dangerous
BE AWARE
BE AD-AWARE
KNOW YOUR BROWSER
DO YOU WANT TO BECOME A
VICTIM?
Security-Web Vulnerabilities-Browser Attacks
TOGETHER LET US BUILD A GREAT
DEFENSE AGAINST THESE
BROWSER ATTACKS
Never DISABLE the firewall which
helps you to protect your
computer from incoming attacks as
well as programs that try to
transmit data from your computer
Never accept files from someone
you don't know
Use caution when downloading
files
Scan downloaded software before
executing
Disable ActiveX, Java and
JavaScript objects if possible
Block pop-up windows, some of
which may be malicious and hide
attacks. This may block malicious
software from being downloaded
to your computer.
Consult website reputation
scorecard for more information on
unknown sites
Here is how?
• Type this URL in your Browser
• http://scanurl.net/
Type the URL/Address
You should see all GREENS 
UNINSTALL ANY BROWSER PLUGIN
& TOOLBAR
Mega Suggestion
Take this Oath
• I will consult IT for any support, even so small
• I will right away UNINSTALL all tool bars
• I will Google and find out how to SECURE my
Browsers
• This week end is dedicated to my SYSTEM
CLEANUP
Recent Browser Attacks
How IT is building Resilience in next
few days for us?
• Hardening OS – We are deploying the
following through group Policy
– Advancements in security architecture, such as
inclusion of Data Execution Prevention (DEP),
Address Space Layout Randomization (ASLR) as a
standard item in the operating system and
improved memory allocation algorithms.
How IT is building Resilience in next
few days for us?
• Inclusion of anti-malware in the operating
system.
• CSC systems already have this
• ALL Evoke to have it soon
We are actively working on
• Drive-By Downloads:
– Drive-by downloads are typically deployed by
hackers who have taken advantage of Web
vulnerabilities such as SQL injection that can be
exploited to "allow attackers to change the
content of a website,”
We are actively working on
• Clickjacking:
– The purpose of this attack is to open the target
website in an invisible frame and get the user to
click somewhere in the frame when they don't
even know they're clicking in that website
• "The pop-up itself is not harmful, but if you
click the button, you open the gate to infect
your machine,"
We are actively working on
• Plug-In- And Script-Enabled Attacks:
– Not only do attackers look for vulnerabilities within the browser itself,
they also frequently ferret out bugs in browser plug-ins and scripting
programming to help them carry out drive-by downloads and
clickjacking attacks.
• In particular, companies should be wary of Java.
• It's one of the most susceptible languages to attack, and Java is a
favorite among criminals to begin Web attacks that can get them
deep within an enterprise network.
• Unless there's a pressing need for a business application that
requires Java, IT should uninstall the plug-in altogether.
SAVE YOURSELF
SAVE OUR ORGANIZATION
Have Gr8 Browsing
days ahead
Credits• My Financier
– Ramesh Madala
• Themes
– Linkin Park
– Armin Van Burren
– Trivikram (అత్తా రింటికి దారేది fame)
• Tools
– Itubesoft
– Youtubedownloader
– Xilisoft video cutter
• ThreatPost.com
• slate.com
• Wired.com
Gladiator
Stays Here
Radiator
Stays Here
Take a
Wise Choice
I Listen to IT I Don’t Listen
THANK YOU ALL

More Related Content

PPT
Safe computing (circa 2004)
PPT
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
PDF
Keep Your SIte Secure
PDF
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
PDF
Cyber security webinar part 1 - Threat Landscape
PDF
Defending Servers - Cyber security webinar part 3
PDF
Defending Workstations - Cyber security webinar part 2
PPTX
Understanding word press security wwc-4-7-17
Safe computing (circa 2004)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Keep Your SIte Secure
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Cyber security webinar part 1 - Threat Landscape
Defending Servers - Cyber security webinar part 3
Defending Workstations - Cyber security webinar part 2
Understanding word press security wwc-4-7-17

What's hot (19)

PDF
How to Remove Linkey From PC
PDF
8 Simple Ways to Hack Your Joomla
PPTX
HOW TO PROTECT YOUR WORDPRESS WEBSITE FROM HACKERS
PPTX
Securing your WordPress website - New Port Richey WP Meetup
PDF
8 Most Popular Joomla Hacks & How To Avoid Them
PPTX
How to Secure your WordPress Website - WordCamp UK 2014
PPT
Dark Alleys/Internet Security
PDF
Hijacking Softwares for fun and profit
PDF
Secrets to a Hack-Proof Joomla Revealed
PPTX
What is Browser Sandbox Protection?
PPTX
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
PDF
Securing Your WordPress Website - WordCamp Sydney 2012
PDF
Beginning WordPress Security WordCamp North Canton 2015
PDF
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
PDF
OSB120 Beat Ransomware
PDF
Let's pwn a chinese web browser!
PDF
When the internet bleeded : RootConf 2014
PPSX
Computer and internet security
PDF
Cyber security webinar 6 - How to build systems that resist attacks?
How to Remove Linkey From PC
8 Simple Ways to Hack Your Joomla
HOW TO PROTECT YOUR WORDPRESS WEBSITE FROM HACKERS
Securing your WordPress website - New Port Richey WP Meetup
8 Most Popular Joomla Hacks & How To Avoid Them
How to Secure your WordPress Website - WordCamp UK 2014
Dark Alleys/Internet Security
Hijacking Softwares for fun and profit
Secrets to a Hack-Proof Joomla Revealed
What is Browser Sandbox Protection?
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Securing Your WordPress Website - WordCamp Sydney 2012
Beginning WordPress Security WordCamp North Canton 2015
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
OSB120 Beat Ransomware
Let's pwn a chinese web browser!
When the internet bleeded : RootConf 2014
Computer and internet security
Cyber security webinar 6 - How to build systems that resist attacks?
Ad

Viewers also liked (20)

PDF
QualysGuard InfoDay 2013 - Web Application Firewall
PPT
Web browser privacy and security
PPT
Trusteer Rapport – Browser Security - How It Works
PPTX
Security Awareness 9-10-09 v5 Web Browser
PPT
Internet
PDF
Site Security Policy - Yahoo! Security Week
ODP
More Browser Basics, Tips & Tricks 2 Draft 17
 
PDF
Web Browser Security - 2016 Comparative Test Results
ODP
Web Browser Basics, Tips & Tricks Draft 17
 
PPTX
Web application attack Presentation
ODP
Web Application Firewall
ODP
More Browser Basics, Tips & Tricks 3 Draft 8
 
PPT
IT103Microsoft Windows XP/OS Chap12
PPTX
Research on Web Browsers ppt
PPSX
Web browser(pp ts)
PPT
Why You Need A Web Application Firewall
PPTX
3D Internet
PPTX
Radware - WAF (Web Application Firewall)
PPTX
Social network privacy & security
PDF
The Dark Side of Social Media: Privacy Concerns
QualysGuard InfoDay 2013 - Web Application Firewall
Web browser privacy and security
Trusteer Rapport – Browser Security - How It Works
Security Awareness 9-10-09 v5 Web Browser
Internet
Site Security Policy - Yahoo! Security Week
More Browser Basics, Tips & Tricks 2 Draft 17
 
Web Browser Security - 2016 Comparative Test Results
Web Browser Basics, Tips & Tricks Draft 17
 
Web application attack Presentation
Web Application Firewall
More Browser Basics, Tips & Tricks 3 Draft 8
 
IT103Microsoft Windows XP/OS Chap12
Research on Web Browsers ppt
Web browser(pp ts)
Why You Need A Web Application Firewall
3D Internet
Radware - WAF (Web Application Firewall)
Social network privacy & security
The Dark Side of Social Media: Privacy Concerns
Ad

Similar to Security-Web Vulnerabilities-Browser Attacks (20)

PPTX
Malware ppt final.pptx
PPTX
computer virus full explain ppt.pptx
PPT
The most dangerous places on the web
PPTX
Internet security
PPTX
Adware and Browser Hijacker - Symptoms and Prevention
PPT
Spyware
PPTX
malwarepatchsedhdjdjrkvjdndbtigktbgifjridj
PPTX
Virus and malware presentation
PPT
anti_virus
PPTX
Owasp top 10 2017
PDF
PC Maintenance
PPTX
Malware program by mohsin ali dahar khairpur
PPT
Virus security presentation
PPT
Safe_IT
PPTX
So Your Company Hired A Pentester
PPTX
Malicious software and software security
PPTX
Trojan horse
PDF
How to Delete plus network.com
PPTX
Security testing
PPT
Malicious
Malware ppt final.pptx
computer virus full explain ppt.pptx
The most dangerous places on the web
Internet security
Adware and Browser Hijacker - Symptoms and Prevention
Spyware
malwarepatchsedhdjdjrkvjdndbtigktbgifjridj
Virus and malware presentation
anti_virus
Owasp top 10 2017
PC Maintenance
Malware program by mohsin ali dahar khairpur
Virus security presentation
Safe_IT
So Your Company Hired A Pentester
Malicious software and software security
Trojan horse
How to Delete plus network.com
Security testing
Malicious

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
Teaching material agriculture food technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx
MYSQL Presentation for SQL database connectivity
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectroscopy.pptx food analysis technology
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
Teaching material agriculture food technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing

Security-Web Vulnerabilities-Browser Attacks

  • 3. JULY MONTH FOCUS ON THE THREAT: BROWSER ATTACKS A New Security Series program for Evoke: Laws-of-Vulnerabilities
  • 5. • Adware • Internet fraud • Malware • Phishing • Spam • Spyware • --------AND
  • 6. Don’t get shocked. As long as you do not LISTEN to IT Security recommendations, you are also part of it
  • 7. Where do browser exploits come from? • When there is a weakness in your browser or if browser security is set low, vulnerabilities can be exploited by cyber crooks. • For example, ActiveX scripts could install by themselves which can be used to change policies and change a program to make its removal difficult.
  • 8. • Users can be tricked into downloading and installing a hijack themselves. • Some browser exploits come in the form of an error report that appears to be from the user's own PC. • Malicious websites can give instructions to install a particular plug-in to view the site correctly and others make the user believe they are getting a browser enhancement or a system update.
  • 15. “Browser Pop-Ups!” – Pop-up ads is classified as a malignant adware program which silently get sneaked and produces numerous malevolent activities to make it corrupt as well as unusable. – It will block your IP address and utilize all your system resources to make your system unusable.
  • 16. Bundled Software along with Browsers is a potential threat
  • 17. That was “ Magneto” • So do not install Browsers as part of bundled downloads. • Example: – When you install Adobe Reader they offer Chrome Download. – And When you are installing Chrome, they offer “Magneto” installation. – These CHAINED Bundles are highly Dangerous
  • 19. DO YOU WANT TO BECOME A VICTIM?
  • 21. TOGETHER LET US BUILD A GREAT DEFENSE AGAINST THESE BROWSER ATTACKS
  • 22. Never DISABLE the firewall which helps you to protect your computer from incoming attacks as well as programs that try to transmit data from your computer
  • 23. Never accept files from someone you don't know
  • 24. Use caution when downloading files
  • 25. Scan downloaded software before executing
  • 26. Disable ActiveX, Java and JavaScript objects if possible
  • 27. Block pop-up windows, some of which may be malicious and hide attacks. This may block malicious software from being downloaded to your computer.
  • 28. Consult website reputation scorecard for more information on unknown sites
  • 29. Here is how? • Type this URL in your Browser • http://scanurl.net/
  • 31. You should see all GREENS 
  • 32. UNINSTALL ANY BROWSER PLUGIN & TOOLBAR Mega Suggestion
  • 33. Take this Oath • I will consult IT for any support, even so small • I will right away UNINSTALL all tool bars • I will Google and find out how to SECURE my Browsers • This week end is dedicated to my SYSTEM CLEANUP
  • 35. How IT is building Resilience in next few days for us? • Hardening OS – We are deploying the following through group Policy – Advancements in security architecture, such as inclusion of Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR) as a standard item in the operating system and improved memory allocation algorithms.
  • 36. How IT is building Resilience in next few days for us? • Inclusion of anti-malware in the operating system. • CSC systems already have this • ALL Evoke to have it soon
  • 37. We are actively working on • Drive-By Downloads: – Drive-by downloads are typically deployed by hackers who have taken advantage of Web vulnerabilities such as SQL injection that can be exploited to "allow attackers to change the content of a website,”
  • 38. We are actively working on • Clickjacking: – The purpose of this attack is to open the target website in an invisible frame and get the user to click somewhere in the frame when they don't even know they're clicking in that website • "The pop-up itself is not harmful, but if you click the button, you open the gate to infect your machine,"
  • 39. We are actively working on • Plug-In- And Script-Enabled Attacks: – Not only do attackers look for vulnerabilities within the browser itself, they also frequently ferret out bugs in browser plug-ins and scripting programming to help them carry out drive-by downloads and clickjacking attacks. • In particular, companies should be wary of Java. • It's one of the most susceptible languages to attack, and Java is a favorite among criminals to begin Web attacks that can get them deep within an enterprise network. • Unless there's a pressing need for a business application that requires Java, IT should uninstall the plug-in altogether.
  • 40. SAVE YOURSELF SAVE OUR ORGANIZATION
  • 42. Credits• My Financier – Ramesh Madala • Themes – Linkin Park – Armin Van Burren – Trivikram (అత్తా రింటికి దారేది fame) • Tools – Itubesoft – Youtubedownloader – Xilisoft video cutter • ThreatPost.com • slate.com • Wired.com
  • 43. Gladiator Stays Here Radiator Stays Here Take a Wise Choice I Listen to IT I Don’t Listen