samedi 10 décembre 2011

overview of the vulnerabilities social networks

All social networking websites have their weaknesses and bugs
whether registration problems / connection, opportunities
cross-site scripting (XSS) vulnerabilities in Java or as intruders
can exploit. A simple Trojan dropper, an attacker
hidden in a widget or a banner ad on the page of the user,
can enter sneak in a system inadequately protected. when
a user accesses an online shopping site from the machine
compromised, the Trojan can capture the username and
his password, the bank card number and other data
sensitive, and send them to the remote attacker.
At present, social networks are among the few
applications that do not depend on a particular platform, in other
words, social networks can run on any
computer with a fairly recent browser, as well as any
the major mobile platforms: iOS, Android, Symbian and Windows.
Moreover, while social networks like Facebook, have
secure their own cloud in which they retain data
personal users, many third-party applications
uncontrolled access to sensitive information (when the user
gives permission when installing the application), which are then
stored in the clean cloud of these applications. There is no way
to control what happens to data once it is in
the private cloud application.

Aucun commentaire:

Enregistrer un commentaire