We believe a better approach is just-in-time scanning that inspects each web page for exploits right when the user visits it. Just-in-time scanning is more effective against transient threats because it looks for types of delivery mechanisms rather than types of malware. It automatically marks known bad sites and it can detect infected and potentially-infected content as you browse the web, outside of search engines.
Search engine hacking and social engineering exploits are also becoming a part of the modern web-borne threat. Websites can be hacked and gamed making them appear prominently in the top search engines. Hackers can plant an iFRAME on a site, force the search engine to cache it and then build bots that click on the site to make it rank higher in a search. Social engineering is also relying on human weaknesses to spread software problems by scaring visitors into downloading a software program to fix a ‘problem’ the site claims to have detected.
There is a common characteristic in all of the issues that are being detected – trust. The openness and collaboration that is an inherent part of the Internet today is increasing the attacks on search engines from legitimate web sites. Social networks are also becoming more frequent targets. The end user really needs to be better educated that these types of threats just aren’t merely annoying, they are dangerous.
This is a serious problem for business and society. It is no longer restrained to kids writing viruses for bragging rights. Today it’s a different story. Malware is almost entirely criminal in its goals — whether someone wants to steal a World of Warcraft password to access game assets, someone’s identity, or corporate intellectual property. It’s a very different ballgame from even five years ago.
Site operators and users now need to take more responsibility for protecting themselves. Protection should extend to greater awareness and education and the incorporation of just-in-time safe-surfing and safe-searching software. Site operators should monitor their sites continually for any changes in the underlying code and take immediate action if malicious changes are discovered.
And for those in the sales channel it has become mandatory to explain the advantages of multiple layers of protection.
Many computer users think they’re protected because their computers are running anti-virus software. They may also be running a firewall and anti-spam software. These are all very important layers of protection, but they are not enough to protect them from web-based threats and transient hacks.
You should advise your customers that multiple layers of protection — anti-virus, anti-spam, firewalls and web-threat scanning as provided by the AVG LinkScanner safe surf technology included in all commercial AVG products — are needed to ensure a safe computing environment.
Opinion: Web threats what you need to know
By
Staff Writers
on Nov 24, 2008 11:37AM

Page 2 of 2 | Single page
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

Tech For Good program gives purpose and strong business outcomes

Kaseya Dattocon APAC 2024 is Back

Build cybersecurity capability with award winning Fortinet training from Ingram Micro
Ingram Micro Ushers in the Age of Ultra

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers
Sponsored Whitepapers

Driving Innovation and Sustainability through Hybrid IT and AI Solutions

Easing the burden of Microsoft CSP management
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework