CHAPTER           

Malware Attacks

2

INFORMATION IN THIS CHAPTER

Malware Defined

Cross-Site Scripting Explored

Introducing Cross-Site Request Forgery

Protecting Yourself

Over the years, we have encountered multiple varieties of worms, Trojans, and viruses. All these items had one thing in common: they attempted to utilize our PCs to perform some malicious activity. This malicious software would attempt to infect us through avenues such as spam, corrupt Web sites, and trick you to click on a link. Let’s not forget about the e-mails we received from friends which told us to check out a cool picture or video. How many people clicked on those? If you’ve been in the security arena for very long, you know tonnes of people did.

Once a machine ...

Get Seven Deadliest Social Network Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.