Results 1 to 2 of 2

Thread: How to Spot Web Based Malicious Applications

  1. #1
    Join Date
    Dec 2010
    Posts
    85

    How to Spot Web Based Malicious Applications

    Nowadays, a web app can be a malware. Whether it is from trusted provider or from the third party, you should always keep an eye on the activity of web app because there are emerging threats from web sides.

    Today's web applications are increasingly part of our lives and are exposed to a lot of threats. This coupled with the fact that every day new web attacks, makes it of great importance taking security measures to adequately protect our web applications.

    How a Web App can be Dangerous?

    For web applications, there is the possibility of malicious files on the web server to load and bring it to execution. Often files are accepted and easily on the web server stored without pre-check the validity. Possible, appropriate attacks often upload functions within the web application. In the absence of an adequate examination of the uploaded files, an attacker can place malicious code or malicious script on the server app. Malicious code is embedded into the file and by a subsequent call made to execute.


    The effects of such an attack are different and depend strongly on the configuration of the web server: There is a risk of a server transfer and an attack on the users of the web application is possible.

    In recent days, in fact, we talked about some applications that exploits a security bug in the Facebook platform, may have access to confidential information contained in the profile of unsuspecting users that use them.

    Some malicious apps began its attack on a page that contains a piece of JavaScript code, which is similar to that commonly used on legitimate sites using AJAX technology.

    This code is responsible for fetching the payload in multiple pieces and is responsible for compiling the entire client machine before running it. Different web pages found on servers attacks exploit vulnerabilities in unpatched versions of Flash Player and Internet Explorer (or any other web browsers).

    How to defend from Web App Attacks

    Web Application Firewalls (WAF - Web Application Firewall) are tools that work at the application level by analyzing the HTTP traffic for malicious traffic to compromising the system. They are therefore suitable to help protect against web attacks. The firewall concentrated at a single point of security measures to protect a computer or local network against external attackers. A firewall is a filter between two networks, two computers or a network and a computer where security requirements are not the same.


    Do not let your pc to compromise with the Malicious Web apps. So always enable Automatic Updates for Windows and also for other security software installed in your computer. When a new threat detected, the security software will updates their signature database to detect those attacks and block them automatically. If the malicious code is already circulating in your computer, then better need a patch for that.

    Now several updated web browser will allow you to easily identify true root domain of a given website and thus allowing you to block malicious Web code. So do not ever use the outdated browser since it is lacking with certain defense techniques.

    Final thought

    Attacks can take the form even if they are not visible "to the naked eye." This requires that the state has a tool that makes the day, processing vulnerabilities and malicious code, but that could react, prevent potential victims and advise institutional and regain control of the situation in case 'major attacks aimed at destabilizing or use a sensitive site or to capture their information for one reason or another. The examples of spectacular attacks like those that hit the U.S. Pentagon and the Microsoft Corporation. Other countries have suffered similar intrusions. This means that such risks are present and can occur at any time.

  2. #2
    Join Date
    Feb 2010
    Posts
    669

    re: How to Spot Web Based Malicious Applications

    Yes. I have heard that some Web apps are Dangerous but user think that they are fully featured apps and functioning properly. Normal computer users do not worry about these kinds of things. They simply browse, visit any site, click any link and download anything without noticing whether it is safe or not. This becomes easy for an attacker to gain access of those computer and use it further to spread more threats remotely.

Similar Threads

  1. black spot in monitor
    By skpanda in forum Monitor & Video Cards
    Replies: 1
    Last Post: 17-06-2013, 10:56 AM
  2. How to pin WEB based applications to taskbar in windows 7
    By Tejaa in forum Customize Desktop
    Replies: 3
    Last Post: 24-08-2012, 06:41 PM
  3. Comparing Nokia Symbain based phone vs Windows based
    By Rounder1 in forum Portable Devices
    Replies: 8
    Last Post: 02-11-2011, 05:01 PM
  4. Spot exchange rate
    By Selva-Star in forum Off Topic Chat
    Replies: 5
    Last Post: 18-11-2010, 04:54 PM
  5. F-Spot or gThumb
    By Vodka in forum Windows Software
    Replies: 5
    Last Post: 16-01-2010, 01:50 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,531,899.96258 seconds with 17 queries