Top Banner
Your computer vulnerabil ities
44

Security-Web Vulnerabilities-Browser Attacks

May 24, 2015

Download

Technology

Raghu Addanki

Browser Vulnerabilities are the prime source of internet threats these days- i mean it
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security-Web Vulnerabilities-Browser Attacks

Your computer vulnerabilities

Page 2: Security-Web Vulnerabilities-Browser Attacks

ONLINE THREATS

Page 3: Security-Web Vulnerabilities-Browser Attacks

JULY MONTH FOCUS ON THE THREAT: BROWSER ATTACKS

A New Security Series program for Evoke: Laws-of-Vulnerabilities

Page 4: Security-Web Vulnerabilities-Browser Attacks

BROWSER EXPLOITS

Page 5: Security-Web Vulnerabilities-Browser Attacks

Browser Exploit Family

• Adware• Internet fraud• Malware• Phishing• Spam • Spyware• --------AND

Page 6: Security-Web Vulnerabilities-Browser Attacks

YOU

Don’t get shocked.As long as you do not LISTEN to

IT Security recommendations, you are also part of it

Page 7: Security-Web Vulnerabilities-Browser Attacks

Where do browser exploits come from?

• When there is a weakness in your browser or if browser security is set low, vulnerabilities can be exploited by cyber crooks.

• For example, ActiveX scripts could install by themselves which can be used to change policies and change a program to make its removal difficult.

Page 8: Security-Web Vulnerabilities-Browser Attacks

• Users can be tricked into downloading and installing a hijack themselves.

• Some browser exploits come in the form of an error report that appears to be from the user's own PC.

• Malicious websites can give instructions to install a particular plug-in to view the site correctly and others make the user believe they are getting a browser enhancement or a system update.

Page 9: Security-Web Vulnerabilities-Browser Attacks

Bogus Alert

Page 10: Security-Web Vulnerabilities-Browser Attacks

Bogus Alert

Page 11: Security-Web Vulnerabilities-Browser Attacks

Bogus Alert

Page 12: Security-Web Vulnerabilities-Browser Attacks

Bogus Alert

Page 13: Security-Web Vulnerabilities-Browser Attacks

Bogus Alert

Page 14: Security-Web Vulnerabilities-Browser Attacks

Bogus Alert

Page 15: Security-Web Vulnerabilities-Browser Attacks

“Browser Pop-Ups!” – Pop-up ads is classified as a malignant adware

program which silently get sneaked and produces numerous malevolent activities to make it corrupt as well as unusable.

– It will block your IP address and utilize all your system resources to make your system unusable.

Page 16: Security-Web Vulnerabilities-Browser Attacks

Bundled Software along with Browsers is a potential threat

Page 17: Security-Web Vulnerabilities-Browser Attacks

That was “ Magneto”

• So do not install Browsers as part of bundled downloads.

• Example: – When you install Adobe Reader they offer Chrome

Download.– And When you are installing Chrome, they offer

“Magneto” installation.– These CHAINED Bundles are highly Dangerous

Page 18: Security-Web Vulnerabilities-Browser Attacks

BE AWAREBE AD-AWAREKNOW YOUR BROWSER

Page 19: Security-Web Vulnerabilities-Browser Attacks

DO YOU WANT TO BECOME A VICTIM?

Page 20: Security-Web Vulnerabilities-Browser Attacks
Page 21: Security-Web Vulnerabilities-Browser Attacks

TOGETHER LET US BUILD A GREAT DEFENSE AGAINST THESE BROWSER ATTACKS

Page 22: Security-Web Vulnerabilities-Browser Attacks

Never DISABLE the firewall which helps you to protect your

computer from incoming attacks as well as programs that try to

transmit data from your computer

Page 23: Security-Web Vulnerabilities-Browser Attacks

Never accept files from someone you don't know

Page 24: Security-Web Vulnerabilities-Browser Attacks

Use caution when downloading files

Page 25: Security-Web Vulnerabilities-Browser Attacks

Scan downloaded software before executing

Page 26: Security-Web Vulnerabilities-Browser Attacks

Disable ActiveX, Java and JavaScript objects if possible

Page 27: Security-Web Vulnerabilities-Browser Attacks

Block pop-up windows, some of which may be malicious and hide attacks. This may block malicious software from being downloaded

to your computer.

Page 28: Security-Web Vulnerabilities-Browser Attacks

Consult website reputation scorecard for more information on

unknown sites

Page 29: Security-Web Vulnerabilities-Browser Attacks

Here is how?

• Type this URL in your Browser

• http://scanurl.net/

Page 30: Security-Web Vulnerabilities-Browser Attacks

Type the URL/Address

Page 31: Security-Web Vulnerabilities-Browser Attacks

You should see all GREENS

Page 32: Security-Web Vulnerabilities-Browser Attacks

UNINSTALL ANY BROWSER PLUGIN & TOOLBAR

Mega Suggestion

Page 33: Security-Web Vulnerabilities-Browser Attacks

Take this Oath

• I will consult IT for any support, even so small• I will right away UNINSTALL all tool bars• I will Google and find out how to SECURE my

Browsers• This week end is dedicated to my SYSTEM

CLEANUP

Page 34: Security-Web Vulnerabilities-Browser Attacks

Recent Browser Attacks

Page 35: Security-Web Vulnerabilities-Browser Attacks

How IT is building Resilience in next few days for us?

• Hardening OS – We are deploying the following through group Policy– Advancements in security architecture, such as

inclusion of Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR) as a standard item in the operating system and improved memory allocation algorithms.

Page 36: Security-Web Vulnerabilities-Browser Attacks

How IT is building Resilience in next few days for us?

• Inclusion of anti-malware in the operating system.

• CSC systems already have this• ALL Evoke to have it soon

Page 37: Security-Web Vulnerabilities-Browser Attacks

We are actively working on

• Drive-By Downloads:– Drive-by downloads are typically deployed by

hackers who have taken advantage of Web vulnerabilities such as SQL injection that can be exploited to "allow attackers to change the content of a website,”

Page 38: Security-Web Vulnerabilities-Browser Attacks

We are actively working on

• Clickjacking:– The purpose of this attack is to open the target

website in an invisible frame and get the user to click somewhere in the frame when they don't even know they're clicking in that website

• "The pop-up itself is not harmful, but if you click the button, you open the gate to infect your machine,"

Page 39: Security-Web Vulnerabilities-Browser Attacks

We are actively working on• Plug-In- And Script-Enabled Attacks:

– Not only do attackers look for vulnerabilities within the browser itself, they also frequently ferret out bugs in browser plug-ins and scripting programming to help them carry out drive-by downloads and clickjacking attacks.

• In particular, companies should be wary of Java.

• It's one of the most susceptible languages to attack, and Java is a favorite among criminals to begin Web attacks that can get them deep within an enterprise network.

• Unless there's a pressing need for a business application that requires Java, IT should uninstall the plug-in altogether.

Page 40: Security-Web Vulnerabilities-Browser Attacks

SAVE YOURSELF

SAVE OUR ORGANIZATION

Page 41: Security-Web Vulnerabilities-Browser Attacks

Have Gr8 Browsing days ahead

Page 42: Security-Web Vulnerabilities-Browser Attacks

Credits• My Financier– Ramesh Madala

• Themes– Linkin Park– Armin Van Burren– Trivikram ( అత్తా� రిం�టికి దారేది fame)

• Tools– Itubesoft– Youtubedownloader– Xilisoft video cutter

• ThreatPost.com• slate.com• Wired.com• Qualys.com• Fireeye.com• Extremetech.com• Symantec.com• Myot.com (My Web of Trust)• Sans.org• Krebsonsecurity.com• Beefproject.com (Browser Exploitation Framework

Project)• Mozilla Development Team Blog• Chrome Beta Team Blog• Microsoft IE Bulletin Blog• Evoke IT Team

Page 43: Security-Web Vulnerabilities-Browser Attacks

Gladiator Stays Here

Radiator Stays Here

Take a

Wise Choice

I Listen to IT I Don’t Listen

Page 44: Security-Web Vulnerabilities-Browser Attacks

THANK YOU ALL