WHAT ARE THE WEB THREATS?
Web threats (or online threats) are malware programs that can
attack you when you use the Internet. These browser-based threats
include a range of malicious software programs designed to infect
The main tool behind these browser infections is the exploit
package, which provides cybercriminals with a route to infect
They don't have a security product installed which is really a risk
and we should have a total security software installed in our device.
Contains a vulnerable operating system or commonly used
application because the user has not applied the latest updates or
the software vendor needs to release a new patch
Applications and operating systems that are targeted by online
Cybercriminals use virtually any vulnerability in an operating
system or an application to launch exploit-based attacks. However,
most cybercriminals develop web threats specifically targeting the
most common operating systems and applications, including the
Because Java is installed on more than 3 billion devices (running on
various operating systems), exploits can be created to exploit
specific Java vulnerabilities on different platforms or operating
Although Adobe Reader has been the target of many attacks,
Adobe has implemented tools to protect the program from exploit
activities. Therefore, it is becoming increasingly difficult to create
effective exploits targeting the application. Nonetheless, Adobe
Reader has remained a common goal for the past 18 months.
Windows and Internet Explorer
Active exploits still target vulnerabilities detected in 2010,
including MS10-042, in the Windows Help and Support Center,
and MS04-028, associated with improper handling of JPEG files.
Cybercriminals use exploits to gain root user privileges and thus
gain virtually complete control of the target device.
Internet security experts have identified the most active malware
programs implicated in we