O'Reilly logo

Seven Deadliest Social Network Attacks by Richard Perez, Carl Timm

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER           

Malware Attacks

2

INFORMATION IN THIS CHAPTER

Malware Defined

Cross-Site Scripting Explored

Introducing Cross-Site Request Forgery

Protecting Yourself

Over the years, we have encountered multiple varieties of worms, Trojans, and viruses. All these items had one thing in common: they attempted to utilize our PCs to perform some malicious activity. This malicious software would attempt to infect us through avenues such as spam, corrupt Web sites, and trick you to click on a link. Let’s not forget about the e-mails we received from friends which told us to check out a cool picture or video. How many people clicked on those? If you’ve been in the security arena for very long, you know tonnes of people did.

Once a machine ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required