How Browsers are attacked
Since Browsers are the obvious face of websites and becoming the "face" of applications on internal networks and on the World Wide Web, they have always been the subject of many attacks throughout the years.
Here is a list of a few of the common attacks below:
Cross Site Scripting - injecting malicious scripts into web pages for the purpose of accessing resources on the system. According to Symantec, it’s responsible for approximately 84% of all security vulnerabilities.
SQL Injection - still quite popular with hackers and is a simple way to destroy an insecure site’s database. It can expose the user-table, revealing usernames and passwords.
Zero-Day attacks - an unknown hole in software code that no one is aware of a problem as until the very day. After which the vulnerability is exploited on the announcement.
Phishing - being redirected to untrusted URLs after being lured to malicious code
Know that apart from the Browsers' developers, that there are teams and individuals who are constantly checking for security holes and vulnerabilities as we speak. We can be assured of this and that is why we constantly get updates and patches for our software from time to time. This is called hardening.
Please Click "Next Page!"