The new favorite target of hackers is browser plug-ins
According to IBM 's network security research, hackers' locations have changed from operating systems to browsers and are now plug - ins in this application. In the first 6 months of 2008, there were 78% of such attacks.
IBM's investigation of network security (X-Force) also found that after only 24 hours of DNS vulnerabilities were announced, 94% of exploits were browser-related vulnerabilities. These attacks, known as "zero-day exploits", appear on the Internet before people realize they have a security hole in their system and cannot keep up. hand.
Photo: Thetechherald " We found that cyber criminals used automated tools to create and distribute attackers 'Tools' while taking advantage of widely published vulnerabilities as targets "Kris Lamb, research director of X-Force, said. " Evidence shows that the security gap published by independent researchers is twice as high as zero-day. I think the vulnerability announcement must be responsible." higher responsibility and managed by a standard, otherwise it will inadvertently help the cybercrime ".
X-Force's report also confirms that the new hacker trend is automatic and widespread. More than 50% of exploits of vulnerabilities are involved in web server applications using SQL (Structured Query Language - SQL) that creates automated attacks and targeting many systems. SQL errors from 25% in 2007 increased to 41% of all web server application security vulnerabilities in the first half of 2008.
In the spam issue, instead of the complicated spam of 2007 (based on images, in the form of attachments .), the scammers now use simple URL spam to make the filter very difficult to detect. them. Nearly 90% of spam today is using URLs. And Russia remains the largest source of spam, responsible for 11% of the world's spam, followed by Turkey with 8% and the US with 7.1%.
As online games and virtual communities continue to be popular, online humans become an exciting target of cybercrime. The X-Force report said the top four password-stealing Trojans all target gamers. The goal is to steal virtual assets and resell them to make real money in online markets.
You should read it
- Firefox will block plug-ins from third parties
- Enhance Wordpress security with Plug-in
- Top 10 brilliant hackers
- Google Chrome has a serious zero-day error, and hackers can execute malicious code at its fullest
- White-hat hackers, from their passion to the job to earn money, and little-known things
- 'Backdoor' plugin, WordPress 3.2 RC2 launches
- Chinese hackers target 27 major universities around the world
- 10 operating systems for security research preferred by hackers
May be interested
- 7 Screenshots Hackers Like You To Save In Your Galleryit's easy to think of screenshots as temporary, but many of us never delete them. the danger is that some of them can become gold mines for hackers, identity thieves, or even just curious friends.
- Do you know who white hat hackers are and how their lives are?what do you understand about hackers? on the battlefield now aside from the black hat hacker there are white hat hackers silently protecting people. so what's the life of white hat hackers?
- What to do when Google is about to remove your favorite browser extensions?google officially moved to manifest v3, the new chrome extension specification. the latest version brings new features and, unfortunately, some limitations that will kill some of your favorite browser extensions when they start rolling out in 2025.
- Elon Musk wary: Experts warn low-cost satellites to flood the Earth's orbit will be a 'lucrative' target for hackerscontrolled satellites can become a hacker weapon.
- How to set the default browser when opening any link on the computersetting the default browser on your computer allows you to open links from other applications using your favorite browser. if you do not change the default browser to your liking, the windows default browser is internet explorer. if you install chrome, firefox or coc coc and want to set them as the default browser, please see the instructions below.
- [Infographic] Things to know about a hackerhave you ever considered a hacker to be a career? the infographic below will help you know if becoming a hacker is right for you.
- Do you know what is the preferred 'prey' of DDoS attack?distributed denial of service (ddos) is a common method used by hackers to try to bring down a website.
- What can hackers actually do if they gain access to your Wi-Fi router?whether hackers target your router to satisfy their curiosity or have actual malicious intentions, here's everything they can do if they have access to this networking device.
- Hacker uses browser extension to take over target's Gmail accountinitial investigation showed that this attack campaign was carried out by a group of hackers with relatively close ties to china.
- Warning: Cyber attacks targeting web applications increase rapidly in 2019dawn smeaton, director of web application security at trend micro, said today's web-based applications are the new targets for hackers.