Monday, February 11, 2013

Browser Exploitation Methodologies

Browser Exploitation Methodologies - Malicious websites, Where are you browsing to… at night?, SEO poisoning (Do you use Google?), Bad clicking habits (web, mail, IM…), Clickjacking, Web traffic injection (MitM – wired & wireless), Have you heard about HTTPS?, Trusted but compromised websites (& Ads)

No comments:

Post a Comment