By Michael P. Kassner Compromising Web sites has become cybercriminals’ favorite method to get malware installed on computers. Here are 10 ways to beef-

Slides:



Advertisements
Similar presentations
B: STUDENT DRIVE MOVE INSTRUCTIONS. Using Internet Explorer: From your computers desktop, double click on the Internet Explorer icon. (Internet Explorer.
Advertisements

Chapter 17: WEB COMPONENTS
Safer, Speedier and Sexier Surfing with Safari. Which Web Browser?
Chrome Extentions Vulnerabilities. Introduction Google Chrome Browser Chrome OS Platform Chrome Web Store Applications Open Source Platform.
Browser Comparisons Internet Explorer 8 & 9, Chrome 11 and Firefox 4 Security, Privacy, Add-ons & Convenience.
1 Secure Interaction Design Kami Vaniea. 2 Overview Designing secure interfaces  Design principles Firefox extensions  Cookies  Phishing  Tracking.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
For Removal Info: visit
COMP 321 Week 12. Overview Web Application Security  Authentication  Authorization  Confidentiality Cross-Site Scripting Lab 12-1 Introduction.
Clearing your Cookies Mozilla Firefox A short guide to help you navigate our website faster Brought to you by:
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Virtual techdays INDIA │ 9-11 February 2011 Safe Browsing Experience for your Home & Office M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Tim Fredrick March 2010 NCAR/ACD/NESL Computing The Mebroot/Torpig threat UCAR Malware incidents.
Safer Web Browsing Terry Labach Information Security Services IST.
Verma - ICISS 2014 R easoning M ining NLP Defense Rakesh M. Verma ReMiND Laboratory Catching Classical and Hijack-based Phishing Attacks.
Security Warnings TROPE: Teachers’ Resources for Online Privacy Education 1.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Create Your Own Webpage. Today’s Agenda Cut & paste code Notepad++ or Notepad at home FTP Web Hosting Wordpress.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Use my floppy disk. 1. copy short cut to desktop. 2.run NoAdHOSTS.exe 3. Surf without ad’s. 4.to reverse everything -edit out all url s you want to return.
Internet safety By Lydia Snowden.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Data Security.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Computer and Information Security Protecting yourself and your clients in the wild and wooly online world.
June 2014 LCCU Meeting Symantec SVP says antivirus is dead. Is it? How do the best free antivirus programs rate and what other protection is available?
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
JavaScript, Fourth Edition
Introduction to the WebBoard Terry Dennis. The WebBoard - Our Connection The WebBoard URL is
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
By William Cook.  How the internet works  How companies pay their bills  How to privately browse the internet.
July 2014 LCCU Meeting We’ll answers members’ questions: –Demonstrate the basics of using the Firefox browser. –What is a sandbox, how does a PC use one.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Chapter 6 Server-side Programming: Java Servlets
Georgios Kontaxis‡, Michalis Polychronakis‡, Angelos D. Keromytis‡, and Evangelos P.Markatos* ‡Columbia University and *FORTH-ICS USENIX-SEC (August, 2012)
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Cookies By: Kendra Alvarez. Concepts of Cookies Cookies are pieces of information generated by a Web server and stored in the user's computer, ready for.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Sessions and cookies (part 2) MIS 3501, Fall 2015 Brad N Greenwood, PhD Department of MIS Fox School of Business Temple University 11/19/2015.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Web Browsers Web Browsers and their 'Add-ons' / 'Extensions'
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
Firefox on Steroids? or Addons and Plugins and Themes, oh my! Pat Murphy NRAO Webmaster (East)
Windows Tutorial 5 Protecting Your Computer
ArcGIS for Server Security: Advanced
Internet has a lot of advantages to our lives, but at the same time it can be regarded as Pandora’s Box as well. A lot of threats have been unleashed with.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
yahoo mail technical support number
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Computer Security.
InformatiOn Technology Services
GenCyber Day Website Security.
Presentation transcript:

By Michael P. Kassner Compromising Web sites has become cybercriminals’ favorite method to get malware installed on computers. Here are 10 ways to beef- up Firefox, making it more difficult for the bad guys.

Mozilla Firefox is a good browser to start with, but third-party extensions make it great. That’s especially apparent when it comes to Web browser security as shown by the following add- ons.

If you only install one extension, make sure it’s NoScript. By default, it blocks all scripts, a good thing. That’s because bad guys love to use scripts to install malware. This way, you decide whether JavaScript, Java, and other content are allowed to run. NoScript

Several members recommended BetterPrivacy as the best way to control Flash cookies. Flash cookies are difficult to remove, do not expire, and can recreate deleted HTTP cookies. After much testing, I know BetterPrivacy works. Whereas controlling Flash cookies using Adobe’s Web site is questionable. BetterPrivacyFlash cookiesAdobe’s Web siteBetterPrivacyFlash cookiesAdobe’s Web site

I must confess, AddBlock Plus is not a security add-on. But, I would not surf the Web without it. It’s awesome; blocking all ads, especially those bandwidth-hogging banner ads. Web pages pop up almost immediately. Try it once and you will be convinced. AddBlock Plussecurity add-onAddBlock Plussecurity add-on

Chad PerrinChad Perrin and I, along with many other security advocates have written about Perspectives. Anything that reduces the likelihood of TLS/SSL "Man-in-the-Middle" attacks (think identity theft) is important. It’s not perfect, but should be in your arsenal, warning you when something is not right. IPerspectives Chad PerrinIPerspectives

SSL BlacklistSSL Blacklist segues with Perspectives, helping to keep your TLS/SSL experience (again think identity theft) safe. It does this by detecting weak or revoked certificates. Both of which should be a concern. SSL Blacklist also checks if the certificate was built using the vulnerable MD5 hash algorithm, another huge security weakness. vulnerable MD5 hash algorithm SSL Blacklistvulnerable MD5 hash algorithm

WOTWOT is an add-on from Web of Trust Services. It is an up-to-date aggregation of spam and phishing blacklists. WOT ranks search entries according to their trustworthiness, vendor reliability, privacy, and child safety. Bottom line, if WOT flags a Web site as bad, you should take notice.Web of Trust Services

PhishTank SiteCheckerPhishTank SiteChecker is a Firefox add-on using an API provided by PhishTank and its active anti-phishing community. Once installed, the add-on will block access to what PhishTank considers potential phishing Web sites, giving the user the option to continue or not. APIPhishTank SiteCheckerAPIPhishTank

WOT and PhishTank SiteChecker are similar in what they do. Yet they do not always agree. I don’t see a problem using both, more information permits better decisions.

PrivacychoicePrivacychoice has developed Trackerwatcher, a unique add-on that allows you to see what’s going on behind the scenes. Trackerwatcher will inform which advertising networks are providing ad content to the Web site you are currently visiting, if they are using behavioral targeting, and how to opt-out. Trackerwatcher PrivacychoiceTrackerwatcher

BugMeNotBugMeNot is a unique add-on. Its main purpose is to eliminate advertising spam from Web sites that require registering. If a Web site requests information, activate the add-on. It will check BugMeNot.com’s extensive database. If registration information is available, BugMeNot will populate the form, allowing you to continue on while remaining anonymous. BugMeNot.com’s BugMeNotBugMeNot.com’s

XmarksXmarks is not a security extension, but it is one helpful add-on. Trying to keep bookmarks synchronized on several computers is a pain. Xmarks does it for you. Install it and get rid of the frustration. Xmarks

Firefox is my Web browser of choice. I also use all of the extensions I recommended. If pushed, I would admit that NoScript, BetterPrivacy, and AddBlock Plus are the ones I consider most important. That said, if I missed your favorite security extension, please let me know.