O'Reilly logo

Seven Deadliest Web Application Attacks by Mike Shema

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Web of Distrust

Information in this Chapter

  • Understanding Malware and Browser Attacks
  • Employing Countermeasures

A wicked Web of deceit lurks beneath many of the Web sites we visit everyday. Some may be obvious, such as misspellings and poor grammar on an unsophisticated phishing page. Some may be ambiguous, such as deciding whether to trust the person buying or selling an item at auction or through an online classified. Other attacks may be more artful, such as lacing Web pages we regularly visit and implicitly trust with treacherous bits of Hypertext Markup Language (HTML). Web traffic is bidirectional. A click in a browser generates traffic to a Web server, which in turn updates content in the browser. This also means that Web ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required