Methods used to penetrate through browsers



When we speak of a hack in the sense I am a lot you might think that it requires the mining of some small programs or malicious software industry, but that of the leading smart roads that used by the hackers is the opposite of the piece, Across the browser is Phishing and in ways that seem very easy compared to the use of mined programs, for this I loved addressed me the best four ways used by the hacker to penetrate the victim via their browser.

1 - security holes in the browser :
When providing any new browser manufacturer Competition poses a substantial amount to those who reveal the vulnerability in the browser and here is the browser in beta version only until they are sure is true that there is no browser gaps and be offered the full version, when you visit some download sites, which contain some viruses may be prevented from browser a party but in other browsers you can download whatever you want because there are gaps in the hundreds in your browser.


2 - Google Chrome applications with malware :
According to statistics protected sites and mining has been revealed that there is a male in the Google Chrome store 51% of harmful additives, which help in the detection of all activities in the browser, as well as sensitive data such as bank cards.

3 - Download some files automatically :
You should always be careful when you log in for some unreliable sites. Once logged in you may notice that the file has been loaded automatically, especially if my extension .exe Here, you must unload and then open protection program and the work of a simple examination of the browser.

4 - serious java applications :
This is the most widespread and dangerous kind and is used in a variety of locations, especially games and music sites where you emerge window tells you that you need to download the updated java to be able to access the site again, and also has been detected in one of the gaps in some of the programming tools.
WhatsApp

Share this

Related Posts

Previous
Next Post »