Tag Archive

Top 10 Online Threats

Jungle ComputerThe strategies hackers use to break into your site can be complicated but the results are usually pretty simple; lost revenue.

Here are the 10 most common threats identified by the Open Web Application Security Project:

1. Injection.

It’s not uncommon for web applications to have injection flaws, especially SQL injection flaws. A hacker who finds one will send malicious data as part of a command or query. The attacker’s message tricks the app into changing data or executing a command it was not designed to obey.


2. Cross-site Scripting.

Cross-site Scripting flaws occur whenever an application sends user-supplied data to a web browser without validating it first. Hackers use these flaws to hijack users away from the site or deface it, thereby costing the site owner in lost business.


3. Insecure Direct Object References.

Applications that lack checks to verify a user is authorized to view particular content can be manipulated to access private data.


4. Broken Authentication.

When account credentials and session tokens aren’t properly protected, hackers can assume users’ identities online.


5. Cross-site Request Forgery (CSRF).

A CSRF attack tricks unknowing site visitors into submitting forged HTTP requests via image tags, XSS, or other techniques. If the user is logged in, the attack succeeds.


Jungle Computer Repair6. Security Misconfiguration.

Security misconfiguration flaws give hackers unauthorized access to system data via default accounts, unused pages, unpatched flaws, unprotected files and directories.


7. Insecure Cryptographic Storage.

Many web applications don’t do enough to protect sensitive data such as credit card numbers, Social Security numbers and login credentials . Thieves may use this data for identity theft, credit card fraud or other crimes.


8. Failure to Restrict URL Access.

Often an app will protect sensitive interactions by not showing links or URLs to unauthorized users. Attackers use this weakness to access those URLs directly in order to carry out unauthorized actions.


9. Insufficient Transport Layer Protection.

Applications often fail to authenticate, encrypt and protect the confidentiality of network traffic. Some use weak algorithms, expired or invalid certificates or use them incorrectly. This allows hackers to “eavesdrop” on online exchanges. An SSL Certificate typically neutralizes this threat.


10. Invalidated Redirects & Forwards.

Web applications often redirect or forward legitimate users to other pages and websites, using insecure data to determine the destination. Attackers use this weakness to redirect victims to phishing or malware sites, or use forwards to open private pages.

https://www.secureserver.net/security/malware-scanner.aspx?ci=89298&prog_id=270511

Evaluating Your Web Browser’s Security Settings

Original release date: January 09, 2008 | Last revised: October 01, 2016

Why are security settings for web browsers important?

SecurityYour web browser is your primary connection to the rest of the internet, and multiple applications may rely on your browser, or elements within your browser, to function. This makes the security settings within your browser even more important. Many web applications try to enhance your browsing experience by enabling different types of functionality, but this functionality might be unnecessary and may leave you susceptible to being attacked. The safest policy is to disable the majority of those features unless you decide they are necessary. If you determine that a site is trustworthy, you can choose to enable the functionality temporarily and then disable it once you are finished visiting the site.

Where can you find the settings?

Each web browser is different, so you may have to look around. For example, in Internet Explorer, you can find them by clicking Tools on your menu bar, selecting Internet Options…, choosing the Security tab, and clicking the Custom Level… button. However, in Firefox, you click Tools on the menu bar and select Options…. Click the Content, Privacy, and Security tabs to explore the basic security options. Browsers have different security options and configurations, so familiarize yourself with the menu options, check the help feature, or refer to the vendor’s web site.

While every application has settings that are selected by default, you may discover that your browser also has predefined security levels that you can select. For example, Internet Explorer offers custom settings that allow you to select a particular level of security; features are enabled or disabled based on your selection. Even with these guides, it is helpful to have an understanding of what the different terms mean so that you can evaluate the features to determine which settings are appropriate for you.

more


Jungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

480.624.2500 | PHONE Domain & Hosting Sales & Support ONLY …

Pennsylvania Contractor License:
# PA114006

Online Storage

Store your files in the cloud! Access documents, photos, video, and more — anytime, anywhere.

We make the cloud flexible, reliable and affordable.
No matter how you choose to use it, Online Storage gives you the features you want – including expert 24/7 support – at a price that puts other cloud services to shame. Still not convinced? Check out the chart below to see how we stack up against the competition.
Learn more

Online Storage

Jungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

We Do Intranets

Intranet

Intranet ServicesAn intranet is a set of networks that are under the control of a single administrative entity.

The intranet uses the IP protocol and IP-based tools such as web browsers and file transfer applications. The administrative entity limits use of the intranet to its authorized users. Most commonly, an intranet is the internal LAN of an organization. A large intranet typically has at least one web server to provide users with organizational information. An intranet is also anything behind the router on a local area network.

Intranet allows company information and resources to be shared more easily among employees. An intranet can also be used to facilitate working in groups and for teleconferences.


Jungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Carbondale, Pennsylvania

From Wikipedia, the free encyclopedia

Carbondale is a city in Lackawanna County, Pennsylvania, United States. Carbondale is located approximately 15 miles due northeast of the city of Scranton in Northeastern Pennsylvania. The population was 8,891 at the 2010 census.

Carbondale PAThe land area that became Carbondale was developed by William and Maurice Wurts, the founders of the Delaware and Hudson Canal Company, during the rise of the anthracite coal mining industry in the early 19th century. Carbondale was the site of the first deep vein anthracite coal mine in the United States. It was also a major terminal of the Delaware and Hudson Railroad.

Like many other cities and towns in the region, Carbondale has struggled with the demise of the once-prominent coal mining industry that had once made the region a haven for immigrants seeking work so many decades ago. Immigrants from Wales, England, Scotland, Ireland, and from throughout continental Europe came to Carbondale in the course of the nineteenth and early-twentieth centuries to work in the anthracite and railroading industries.


Jungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com