Man-in-the-middle attacks: Man-in-the-middle attacks refer to a situation whereby an attacker intercepts relevant online activities of two different connections, controls the connection and then switches the activities of both connections to the attacker’s benefit.This occurs mostly when a browser’s security and update system is not continuous or active enough to detect and stall such attacks. Advanced persistent threats: This occurs when an unauthorized user is able to access a particular network for a long and constant period of time without being discovered.Many plug-ins do not contain maximum security and so can be easily exploited, which could in turn cause the browser to become vulnerable whenever the infected plug-in is being exploited. Code execution exploits in plug-ins: This involves the injection of dangerous and harmful codes into the plug-ins of a browser.Such attacks can put the user at risk of data loss. One common way hackers carry out this code exploit is by creating replicas of websites on a browser so that users can input personal information unknowingly.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |