Browser exploit: Difference between revisions
Appearance
Content deleted Content added
m →See also: remove dead link to Comparison of web browsers#Security and vulnerabilities|Comparison of web browser vulnerabilities |
←Redirected page to Browser security Tag: New redirect |
||
Line 1: | Line 1: | ||
⚫ | |||
{{Refimprove|date=January 2017}} |
|||
A '''browser exploit''' is a form of malicious code that takes advantage of a flaw or vulnerability in an operating system or piece of software with the intent to breach [[browser security]] to alter a user's browser settings without their knowledge.<ref>{{Cite journal|last1=Sood|first1=Aditya K.|last2=Zeadally|first2=Sherali|date=2016-09-28|title=Drive-By Download Attacks: A Comparative Study|url=https://ieeexplore.ieee.org/document/7579103|journal=IT Professional|volume=18|issue=5|pages=18–25|doi=10.1109/MITP.2016.85|s2cid=27808214|issn=1520-9202}}</ref> Malicious code may exploit [[ActiveX]], [[HTML]], images, [[Java (programming language)|Java]], [[JavaScript]], and other Web technologies and cause the browser to run arbitrary code. |
|||
==Symptoms== |
|||
Users whose web browsers have fallen victim of a successful browser exploit may find their homepage, search page, and/or favorites have been changed. Other signs include Internet settings options within the browser being altered, access being blocked to specific functions, and the redirection of incorrectly typed URL prefixes. |
|||
==Prevention== |
|||
There are multiple ways users can protect their web browsers from falling victim to a browser exploit. Such things include installing firewall software, keeping software updated, being cautious when downloading files, and not opening email attachments from unknown sources. |
|||
==Notable browser exploits== |
|||
[[JailbreakMe]] is a series of browser based exploits used to [[IOS jailbreaking|jailbreak]] [[Apple Inc.|Apple]]'s [[iOS]] [[mobile operating system]]. It uses an exploit in the browser's PDF parser to execute unauthorised code and gain access to the underlying operating system. |
|||
==See also== |
|||
⚫ | |||
*[[Internet security]] |
|||
==References== |
|||
{{Reflist}} |
|||
==External links== |
|||
*[https://web.archive.org/web/20160308011850/https://www.mywot.com/en/online-threats/browser-exploits Online Threats - Browser exploits | WOT Web of Trust] |
|||
{{DEFAULTSORT:Browser Exploit}} |
|||
[[Category:Web security exploits]] |
|||
[[Category:Web browsers]] |
Revision as of 05:09, 29 January 2024
Redirect to: