Você está na página 1de 3

8/25/13

Myths of Secure Web Browsing | @HuyNT

@HUYNT

DATABASE

GENERAL IT ABOUT

J2EE DEVELOPMENT

WEBLOGIC

JAVA CERTIFICATIONS

Anything worthwhile MYTHS OF SECURE WEB BROWSING


May 18, 2013 by huynt in Internet Edit

Search this site...

R ECEN T P O S T S

1 . I am saf e b ec ause I n ever visited porn w eb site Wrong. Nowadays, many more malware infection are linked to visit to legitimate and popular websites than porn or counterfeit sites. According to Cisco 2013 Annual Security Report, Business/Industry site category stands at 3rd position behind advertising and dynamic content categories in the top 20 dangerous website categories. Included are Shopping (8th), Travel (9th), News (13th). Porn or counterfeit products (e.g. cheap Viagra) didnt make it to top 20. 2. I am saf e b ec ause I use Chrom e or Firef ox If you ever think only noob use IE, then youre not safer using Chrome or Firefox than if you use IE. Because if the more highly skills people uses Firefox or Chrome, the higher probability that someone will discover or learn of security vulnerability in those browsers and exploit it for evil purpose. In addition, as marketshare of Chrome and Firefox increases, they become more lucrative targets for hackers. Furthermore, Microsoft has made significant improvement in protecting its products and their users. An recent test founds that using IE 10 is safer than using Chrome or Firefox. 3. I am saf e b ec ause I am ac c essin g b ehin d a c orporate proxy an d f irew all Corporate invests a lot in security protection by equipping their networks with firewall, DMZ and proxy so it must be safe to access from behind such tools, right?
huynt.wordpress.com/2013/05/18/myths-of-secure-web-browsing/

[Unix] Difference between [ and [[ syntax [Unix] Find the location of the executables [Unix] Recursive listing files under a directory [Database] EXISTS or INNER JOIN: Duplicate records To check which form of String comparison is supported
AR CH I V ES

August 2013 July 2013 June 2013 May 2013 December 2012 October 2012 August 2012 July 2012 June 2012 May 2012

1/3

8/25/13

Myths of Secure Web Browsing | @HuyNT

Wrong. For 3 reasons: - First, 83% of web malware are in the form of script or iframe (Cisco report) which can easily passthrough all above mentioned security products. - Second, more and more corporate allows their user to access multimedia and web 2.0 sites. Such highly dynamic and interaction sites often requires running of executable code. This increases the risk of exploiting known or unknown browsers vulnerabilities. - Third, firewall, DMZ and proxy are are part of a protection called perimeter security and therefore are ineffective in protecting user from malicious insider.

CAT EG O R I ES

Database Family Internet Java JSR 303 Bean Validation Miscellaneous SCBCD SCJP Script SCWCD Spring

Share this:

Press This

Twitter

Facebook

Uncategorized
T AG CLO U D

Like this:

Like
Be the first to like this.

Tags : internet, Security

Custom Constraint database economics EJB Exception


bash blank Handling exists fun Hibernate Validator inner join internet

Leave a Reply
Enter your comment here...

JSR 303 - Bean Validation


J2EE JDBC file Oracle POJO SessionAttributes space

list

Security

Spring MVC
String comparison Transaction JSR 303 Bean Validation Let Your Bean Validate Itself To check which form of String comparison is supported Management Tuoitre newspaper

unix
M ET A

Site Admin Log out Entries RSS Comments RSS Blog at WordPress.com.

huynt.wordpress.com/2013/05/18/myths-of-secure-web-browsing/

2/3

8/25/13

Myths of Secure Web Browsing | @HuyNT

Blog at WordPress.com. The Origin Theme.

huynt.wordpress.com/2013/05/18/myths-of-secure-web-browsing/

3/3

Você também pode gostar