Opinion: Web threats what you need to know

By on
Opinion:  Web threats what you need to know
Page 2 of 2  |  Single page
We believe a better approach is just-in-time scanning that inspects each web page for exploits right when the user visits it. Just-in-time scanning is more effective against transient threats because it looks for types of delivery mechanisms rather than types of malware. It automatically marks known bad sites and it can detect infected and potentially-infected content as you browse the web, outside of search engines.

Search engine hacking and social engineering exploits are also becoming a part of the modern web-borne threat. Websites can be hacked and gamed making them appear prominently in the top search engines. Hackers can plant an iFRAME on a site, force the search engine to cache it and then build bots that click on the site to make it rank higher in a search. Social engineering is also relying on human weaknesses to spread software problems by scaring visitors into downloading a software program to fix a ‘problem’ the site claims to have detected.

There is a common characteristic in all of the issues that are being detected – trust. The openness and collaboration that is an inherent part of the Internet today is increasing the attacks on search engines from legitimate web sites. Social networks are also becoming more frequent targets. The end user really needs to be better educated that these types of threats just aren’t merely annoying, they are dangerous.

This is a serious problem for business and society. It is no longer restrained to kids writing viruses for bragging rights. Today it’s a different story. Malware is almost entirely criminal in its goals — whether someone wants to steal a World of Warcraft password to access game assets, someone’s identity, or corporate intellectual property. It’s a very different ballgame from even five years ago.

Site operators and users now need to take more responsibility for protecting themselves. Protection should extend to greater awareness and education and the incorporation of just-in-time safe-surfing and safe-searching software. Site operators should monitor their sites continually for any changes in the underlying code and take immediate action if malicious changes are discovered.

And for those in the sales channel it has become mandatory to explain the advantages of multiple layers of protection.

Many computer users think they’re protected because their computers are running anti-virus software. They may also be running a firewall and anti-spam software. These are all very important layers of protection, but they are not enough to protect them from web-based threats and transient hacks.

You should advise your customers that multiple layers of protection — anti-virus, anti-spam, firewalls and web-threat scanning as provided by the AVG LinkScanner safe surf technology included in all commercial AVG products — are needed to ensure a safe computing environment.

Previous Page
1 2 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Log in

Email:
Password:
  |  Forgot your password?
By using our site you accept that we use and share cookies and similar technologies to perform analytics and provide content and ads tailored to your interests. By continuing to use our site, you consent to this. Please see our Cookie Policy for more information.