Online (in)security: The current threat landscape Nikolaos Tsalis

Size: px
Start display at page:

Download "Online (in)security: The current threat landscape Nikolaos Tsalis"

Transcription

1 Online (in)security: The current threat landscape Nikolaos Tsalis November 2015

2 Online (in)security: The current threat landscape Nikolaos Tsalis Information Security & Critical Infrastructure Protection Laboratory Dept. of Informatics, Athens University of Economics & Business

3 Background Info Information Security & Critical Infrastructure Protection (INFOSEC) Laboratory Dept. of Informatics, Athens University of Economics & Business, Greece Research topics Critical Information Systems Security Web Security Cloud Computing Smartphone Forensics Security and Privacy in Online Social Networks 3

4 Topics at a glance 1. Introduction 2. Part 1 Browser Controls Methodology Proposed categorization Results 3. Part 2 Security and privacy add-ons Methodology Observations Proposed categorization Results 4. Part 3 Phishing and malware protection Methodology Results 5. Conclusions 4

5 OWASP Top 10 5

6 What about the average user? Does she know if there are any available security mechanisms? Does she know which are they? Does she know how to use them properly? Are they effective? 6

7 Tested browsers 7

8 Methodology Browser controls (n=32) Enumeration of browsers : graphical interfaces and available hidden menus if any e.g. about:config in Mozilla Firefox 8

9 Proposed categorization Content controls Privacy controls Browser management controls Third-party software controls Web browsing controls Block location data Browser update Auto update extensions Certificate warning Block cookies Block referrer Certificate manager Block third-party cookies Proxy server Enable DNT Search engine manager History manager Disable Java Disable JavaScript Disable plugin Malware protection Modify user-agent Phishing protection External plugin check SSL/TLS version selection Block pop-ups Private browsing Local blacklist Disable extension Master password Block images Auto update plugins Task manager Manually update extensions Manually update plugins Report rogue Website Website checking 9

10 Results 40.00% 35.00% 34.40% 30.00% 25.00% 20.00% 15.00% 10.00% 5.00% 15.65% 21.90% 12.50% 25% 0.00% Apple Safari Google Chrome Internet Explorer Mozilla Firefox Opera Unavailable controls 10

11 Methodology Browser add-ons (n=227) Enumeration of browsers security and privacy add-ons, that were available in each repository. Browser Safari Chrome Internet Explorer No 38 N/A (65) 7 Firefox 1327 (65) Opera 52 11

12 Observations Variety of available add-ons for each browser Confusing grouping of add-ons in repository 1 st level categorization 2 nd level categorization Safari Firefox None Opera 12

13 Proposed Categorization 1. Content filtering: Block content (advertisements, cookies, images, pop-ups, etc.) 2. Parental control: Includes traffic filters to block websites containing inappropria te material 3. Passwords: Generators Managers 4. Plain proxy: Simple proxy without any encryption included 5. Privacy: Privacy protection add-ons (e.g. privacy settings manager) 6. Protection from rogue websites: Antivirus blacklists Malware blacklists Phishing blacklists Reputation blacklists Sandbox 7. Third-party software management: Blocking thirdparty software (e.g. Flash, Java, JavaScript, etc.) 8. Tracking: Blocking website(s) that track user s online behavior Social Media (SM) redirection 9. Traffic encryption via proxy: Proxy that encrypts user s traffic 13

14 Results Traffic encryption via proxy 2.63% 26.32% Tracking Privacy 0% Plain proxy 36.84% Passwords Passwords 18.42% Parental Control Content Filtering 5.26% 7.70% 20.00% Protection from rogue sites 10.53% Privacy Plain proxy Third-party software 18.42% Protection from rogue sites 15.40% Tracking 5.26% Third-party software 12.30% Traffic encryption via proxy 7.70% 8% 15.40% 23.00% Parental Control Content Filtering 15.40% 14

15 Results Traffic encryption via proxy 11.00% 42.00% Tracking Third-party software 13.00% 24.00% Privacy Plain proxy 13% Content Filtering 5.77% Protection from rogue sites 23.08% Privacy 23.08% Plain proxy 4% 15.00% Passwords Parental Control 28.85% Tracking Third-party software 18.00% Protection from rogue sites 13.46% Traffic encryption via proxy 21.15% Passwords 8.00% Parental Control 39.00% Content Filtering 5.77% 15.38% 15

16 25.00% 25.00% 19.34% 18.40% 14.15% 8.49% Content Filtering Parental Control 7.07% 6% Passwords Plain proxy 9.43% Privacy Protection Third-party from rogue software sites Tracking Traffic encryption via proxy 16

17 Methodology Browser ios Android Phishing and malware protection Safari Mobile To evaluate the protection against phishing Chrome Mobile Opera Mini attacks, we collected phishing URLs that were reported by PhishTank. To evaluate the protection against malware attacks, we used the open source Collective Intelligence Framework (CIF), which allows the collection and analysis of malicious threat information from a large number of trusted sources Browser Firefox Mobile Opera Mobile Windows 7 Chrome Firefox Internet Explorer Opera 'Browser' is the pre-installed browser in Android 17

18 Phishing URL Detection % 90.00% 80.00% 70.00% 60.00% 50.00% 40.00% 30.00% 20.00% 10.00% 0.00% 48.40% 41.70% 77.90% 13.70% 9.90% 8.40% 93.00% 86.70% 76% 16% 5.70% 5.90% 7.30% 8% 1.30% IE (Win) Opera (Win) Chrome (Win) Firefox (Win) Opera Mobile (Android) 85.40% 11.10% 3.40% Firefox Mobile (Android) 38.70% 34.90% 26.40% Safari Mobile (ios) Blocked False Negatives Non Phishing 18

19 Malicious URL Detection 70.00% 60.00% 50.00% 40.00% 30.00% 20.00% 10.00% 40.90% 30.00% 12.90% 58.30% 29.10% 28.90% 20.00% 39.40% 40.60% 5.00% 52.10% 42.90% 11.90% 48.80% 39.40% 9.90% 45.80% 44.30% 0.00% IE (Win) Opera (Win) Chrome (Win) Firefox (Win) Opera Mobile (Android) Firefox Mobile (Android) Blocked False Negatives Non Phishing 19

20 Conclusions There is an adequate amount of controls available for the average user Although, it is still unclear if: Alice knows which are they how to use them and If these mechanisms offer a proper level of protection All comes down to the user 20

21 I am regularly asked what average Internet users can do to ensure their security. My first answer is usually, Nothing -- you're screwed. Bruce Schneier 21

22 References 1. Theoharidou, M., Tsalis, N., Gritzalis, D., In Cloud we trust: Risk-assessment-as-a-service, in Proc. of the 7 th IFIP International Conference on Trust Management, pp , Springer (AICT 401), Spain, Tsalis N., Mylonas A., Gritzalis D., An intensive analysis of the availability of security and privacy browser add-ons, in Proc. of the 10 th International Conference on Risks and Security of Internet and Systems (CRISIS-2015), Springer (LNCS), Greece, Tsalis N., Virvilis N., Mylonas A., Apostolopoulos A., Gritzalis D., Browser blacklists: A utopia of phishing protection, in Security and Cryptography, M. Obaidad and A. Holzinger (Eds.), Lecture Notes (CCIS), Springer, Tsalis, N., Theoharidou, M., Gritzalis, D., Return on security investment for Cloud platforms, in Proc. of the Economics of Security in the Cloud Workshop, pp , IEEE Press, United Kingdom, Virvilis N., Mylonas A., Tsalis N., Gritzalis D., "Security busters: Web browser security vs. rogue sites", Computers & Security, Vol. 52. pp , July Virvilis, N., Tsalis, N., Mylonas, A., Gritzalis, D., "Mobile devices: A phisher's paradise", in Proc. of the 11 th International Conference on Security and Cryptography (SECRYPT-2014), pp , ScitePress, Austria,

Security and privacy in the smartphone ecosystem: Final progress report

Security and privacy in the smartphone ecosystem: Final progress report Security and privacy in the smartphone ecosystem: Final progress report Alexios Mylonas Athens University of Economics & Business Overview 2 Research Motivation Related work Objective Approach Methodology

More information

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0 Author: Tonny Rabjerg Version: 20150730 Company Presentation WSF 4.0 WSF 4.0 Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the

More information

If you're having any trouble accessing Cayuse 424 or the Research Suite, you may want to clear your cookies [1].

If you're having any trouble accessing Cayuse 424 or the Research Suite, you may want to clear your cookies [1]. Published on Cayuse Support (http://support.cayuse.com) Home > Browser Support & Configuration Browser Support & Configuration The Research Suite is supported in recent versions of Firefox and Internet

More information

SPHINX: A system for telling computers and humans apart through audio CAPTCHA. Yannis Soupionis

SPHINX: A system for telling computers and humans apart through audio CAPTCHA. Yannis Soupionis SPHINX: A system for telling computers and humans apart through audio CAPTCHA Yannis Soupionis Outline Introduction Internet Telephony Spam over Internet Telephony (SPIT) SPIT Phenomenon Methodology Research

More information

REHAU SUPPLIER PORTAL

REHAU SUPPLIER PORTAL REHAU Group REHAU SUPPLIER PORTAL BROWSER COMPATIBILITY & REQUIREMENTS BPE-IBS Revision 1 vom 15.02.2018 5923DE 03.06 - 2 - TABLE OF CONTENT 1 REHAU SUPPLIER PORTAL - INTRODUCTION... 3 2 GENERAL BROWSER

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

Can HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit

Can HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit Can HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit 1 2 o hai. 3 Why Think About HTTP Strict Transport Security? Roadmap what is HSTS?

More information

The Cisco HCM-F Administrative Interface

The Cisco HCM-F Administrative Interface CHAPTER 5 This chapter contains information on the following topics: Overview of Cisco HCM-F Administrative Interface, page 5-1 Browser Support, page 5-2 Login and Logout, page 5-4 Online Help, page 5-5

More information

Browser Support Internet Explorer

Browser Support Internet Explorer Browser Support Internet Explorer Consumers Online Banking offers you more enhanced features than ever before! To use the improved online banking, you may need to change certain settings on your device

More information

CPD Online System Requirements and Browser Settings

CPD Online System Requirements and Browser Settings CPD Online System Requirements and Browser Settings Browser & Operating System Compatibility Matrix IE 11.0 1 Edge 1 Firefox 51 Chrome 56 Safari 8.0.7 Safari 9.1.2 Safari 10.0 Supported Operating Systems

More information

Report Exec Enterprise Browser Settings. Choose Settings Topic

Report Exec Enterprise Browser Settings. Choose Settings Topic Report Exec Enterprise Browser Settings Choose Settings Topic Overview... 2 Technical Support... 2 Windows OS... 2 Microsoft Internet Explorer... 2... 2 Trusted Sites... 3 Browsing History... 3 Temporary

More information

Architectural Overview INSIGHT Remote Monitoring Platform

Architectural Overview INSIGHT Remote Monitoring Platform Architectural Overview Remote Monitoring Platform 1950 Excel Drive Mankato, MN 56001 U.S.A. 1-800-635-4269 www.winland.com Summary Summary The platform provides remote environmental monitoring, data logging,

More information

Recommended Browser Settings for Self Service Applications Revised: 10/10/2013 vmc

Recommended Browser Settings for Self Service Applications Revised: 10/10/2013 vmc Recommended Browser Settings for Self Service Applications Revised: 10/10/2013 vmc This document describes the steps to configure the common web browsers for use with the City of Boise s webbased applications.

More information

iphone ios 8.x (4s, 5, 5s & 5c, 6, 6+ models) ipad ios 8.x (all models) Android OS or higher

iphone ios 8.x (4s, 5, 5s & 5c, 6, 6+ models) ipad ios 8.x (all models) Android OS or higher OVERVIEW The ADF Desktop Integration template is used in the Projects module and General Ledger module for uploading journal entries. After the new version of Oracle is completed, you will be prompted

More information

Overview Cross-Site Scripting (XSS) Christopher Lam Introduction Description Programming Languages used Types of Attacks Reasons for XSS Utilization Attack Scenarios Steps to an XSS Attack Compromises

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that simplifies security and significantly

More information

Browser Settings for MyCompLab and MyLiteratureLab. October 5, 2010

Browser Settings for MyCompLab and MyLiteratureLab. October 5, 2010 Browser Settings for MyCompLab and MyLiteratureLab October 5, 2010 Copyright 2010 by Pearson Education, Inc. All rights reserved. No part of the contents of this book may be reproduced or transmitted in

More information

Easy Setup Guide. Cisco ASA with Firepower Services. You can easily set up your ASA in this step-by-step guide.

Easy Setup Guide. Cisco ASA with Firepower Services. You can easily set up your ASA in this step-by-step guide. Cisco ASA with Firepower Services Easy Setup Guide You can easily set up your ASA in this step-by-step guide. Connecting PC to ASA Installing ASDM 3 Configuring ASA 4 Using Umbrella DNS Connecting PC to

More information

Chrome and IE comparisons

Chrome and IE comparisons Last updated September 16, 2016 Copyright Copyright ezdi, Inc 2016 All Rights Reserved All rights reserved. No part of this manual may be photocopied or reproduced in any form without written permission

More information

Getting Started with Authoring in Claro

Getting Started with Authoring in Claro Getting Started with Authoring in Claro dominknow s Claro is a new breed of web- based authoring and publishing software designed for teams. This short guide helps you get started quickly as an author

More information

Web browsers - Firefox

Web browsers - Firefox N E W S L E T T E R IT Computer Technical Support Newsletter Web browsers - Firefox February 09, 2015 Vol.1, No.16 A Web Browser is a program that enables the user to view web pages. TABLE OF CONTENTS

More information

Browser Guide for PeopleSoft

Browser Guide for PeopleSoft Browser Guide for PeopleSoft Business Process Guide For Academic Support Specialists (Advisors) TABLE OF CONTENTS PURPOSE...2 INTERNET EXPLORER 7...3 GENERAL TAB...4 SECURITY TAB...6 PRIVACY TAB...10 CONTENT

More information

Download firefox with virus protection

Download firefox with virus protection P ford residence southampton, ny Download firefox with virus protection 3-11-2015 Protect your devices with the best free antivirus on the market. Download Avast antivirus and anti-spyware protection for

More information

QUICK SET-UP VERIFICATION...3

QUICK SET-UP VERIFICATION...3 TABLE OF CONTENTS 1 QUICK SET-UP VERIFICATION...3 2 INSTALLING CERTIFICATES...3 3 IF YOU USE MS INTERNET EXPLORER...3 3.1 INSTALLING THE CERTIFICATE...3 3.2 SSL3 ACTIVATION:...3 3.3 JAVASCRIPT ACTIVATION...3

More information

Google on BeyondCorp: Empowering employees with security for the cloud era

Google on BeyondCorp: Empowering employees with security for the cloud era SESSION ID: EXP-F02 Google on BeyondCorp: Empowering employees with security for the cloud era Jennifer Lin Director, Product Management, Security & Privacy Google Cloud What is BeyondCorp? Enterprise

More information

Getting Started with Firefox 2.0 For Windows 2000/XP Author: Ryan McCalla Revised by Mitchell Ochi

Getting Started with Firefox 2.0 For Windows 2000/XP Author: Ryan McCalla Revised by Mitchell Ochi WIN1044 August 2007 Getting Started with Firefox 2.0 For Windows 2000/XP Author: Ryan McCalla Revised by Mitchell Ochi Introduction... 1 System Requirements... 1 Where to Get It... 1 Installation... 2

More information

Detecting Drive-by-Download Attacks based on HTTP Context-Types Ryo Kiire, Shigeki Goto Waseda University

Detecting Drive-by-Download Attacks based on HTTP Context-Types Ryo Kiire, Shigeki Goto Waseda University Detecting Drive-by-Download Attacks based on HTTP Context-Types Ryo Kiire, Shigeki Goto Waseda University 1 Outline Background Related Work Purpose Method Experiment Results Conclusion & Future Work 2

More information

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, 2016 * Sources include learnfree.org, PC World, wikpedia.com, techterms.com SOME QUESTIONS TO ASK YOURSELF. HAVE YOU.. 1. Googled yourself to see what

More information

The best for everyday PC users

The best for everyday PC users The best for everyday PC users 2019 ESET Internet Security delivers rock-solid protection for everyday web users, built on ESET s trademark best mix of detection, speed and usability. Legendary antivirus

More information

Beacon Health System DOCS Page Troubleshooting

Beacon Health System DOCS Page Troubleshooting Beacon Health System DOCS Page Troubleshooting The preferred method of accessing DOCS page is to use a Beacon device, which Beacon Info Systems can fully support. DOCS page resources are available from

More information

Learning Center Computer and Security Settings

Learning Center Computer and Security Settings Learning Center Computer and Security Settings Learning Center Computer Settings Please Note: To allow your computer to communicate most effectively with the Learning Center, and update your training record

More information

E-statement Settings Guide

E-statement Settings Guide E-statement Settings Guide Contents Windows PC... 3 Google Chrome... 3 Internet Explorer... 7 Mozilla Firefox... 10 Apple Macintosh... 14 Safari for Mac... 14 Apple ios (iphone/ipad)... 21 Safari for ios

More information

WEB BROWSER SANDBOXING: SECURITY AGAINST WEB ATTACKS

WEB BROWSER SANDBOXING: SECURITY AGAINST WEB ATTACKS WEB BROWSER SANDBOXING: SECURITY AGAINST WEB ATTACKS AVAR 2011 by Rajesh Nikam Security Simplified CONTENTS Rise of Web Attacks Application Vulnerabilities Existing Protection Mechanisms Need for Effective

More information

Mac OS X version 10.6 and Below for Students

Mac OS X version 10.6 and Below for Students Mac OS X version 10.6 and Below for Students The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with

More information

Get ready for mycourses

Get ready for mycourses Get ready for mycourses For the best experience with mycourses your computer and web browser need to be up to date and configured correctly. Index Use a supported web browser Microsoft Windows Apple OS

More information

Web Application Penetration Testing

Web Application Penetration Testing Web Application Penetration Testing COURSE BROCHURE & SYLLABUS Course Overview Web Application penetration Testing (WAPT) is the Security testing techniques for vulnerabilities or security holes in corporate

More information

Tabular Presentation of the Application Software Extended Package for Web Browsers

Tabular Presentation of the Application Software Extended Package for Web Browsers Tabular Presentation of the Application Software Extended Package for Web Browsers Version: 2.0 2015-06-16 National Information Assurance Partnership Revision History Version Date Comment v 2.0 2015-06-16

More information

The security of Mozilla Firefox s Extensions. Kristjan Krips

The security of Mozilla Firefox s Extensions. Kristjan Krips The security of Mozilla Firefox s Extensions Kristjan Krips Topics Introduction The extension model How could extensions be used for attacks - website defacement - phishing attacks - cross site scripting

More information

Coordinated Disclosure of Vulnerabilities in AVG Antivirus Free Android

Coordinated Disclosure of Vulnerabilities in AVG Antivirus Free Android Coordinated Disclosure of Vulnerabilities in AVG Antivirus Free Android 5.9.4.1 1 Executive summary Researchers of MRG Effitas tested the AVG AntiVirus Free Android application. During use, we came across

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management).

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management). Contents Introduction Prerequisites Requirements Components Used Background Information Outbound SSL Decryption Inbound SSL Decryption Configuration for SSL Decryption Outbound SSL decryption (Decrypt

More information

Tenable.io User Guide. Last Revised: November 03, 2017

Tenable.io User Guide. Last Revised: November 03, 2017 Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link

More information

Built without compromise for users who want it all

Built without compromise for users who want it all Built without compromise for users who want it all 2019 Enjoy your digital life, secured by ESET s ultimate multilayered antimalware protection for all internet users, built on ESET s trademark best mix

More information

Getting started with UCC VirtualApp

Getting started with UCC VirtualApp UNIVERSITY COLLEGE CORK Getting started with UCC VirtualApp Information Services Procedure Version 1.1 Killian Cholbi The following document outlines the procedure that members of staff will follow to

More information

(System) Integrity attacks System Abuse, Malicious File upload, SQL Injection

(System) Integrity attacks System Abuse, Malicious File upload, SQL Injection Pattern Recognition and Applications Lab (System) Integrity attacks System Abuse, Malicious File upload, SQL Injection Igino Corona igino.corona (at) diee.unica.it Computer Security April 9, 2018 Department

More information

What is a web browser?

What is a web browser? Web Browsers What is a web browser? A software application for retrieving, presenting, and traversing information resources on the World Wide Web. Web page Image Video Other piece of content History of

More information

8.0 Help for End Users About Jive for SharePoint System Requirements Using Jive for SharePoint... 6

8.0 Help for End Users About Jive for SharePoint System Requirements Using Jive for SharePoint... 6 for SharePoint 2010/2013 Contents 2 Contents 8.0 Help for End Users... 3 About Jive for SharePoint... 4 System Requirements... 5 Using Jive for SharePoint... 6 Overview of Jive for SharePoint... 6 Accessing

More information

CSC Introduction to Computers and Their Applications

CSC Introduction to Computers and Their Applications CSC 170 - Introduction to Computers and Their Applications Lecture 8 The World Wide Web What is the World Wide Web? The Web is not the Internet The Internet is a global data communications network The

More information

Secure Frame Communication in Browsers Review

Secure Frame Communication in Browsers Review Secure Frame Communication in Browsers Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka October 16, 2011 1 Introduction to the topic and the reason for the topic being

More information

Collaborative Security Management Services for Port Information Systems

Collaborative Security Management Services for Port Information Systems Collaborative Security Management Services for Port Information Systems Theodoros Ntouskas, Dimitris Gritzalis Theodoros Ntouskas, Dimitris Gritzalis December 2015 Collaborative Security Management Services

More information

Q2 TLS 1.0 Disablement Frequently Asked Questions 12/4/17

Q2 TLS 1.0 Disablement Frequently Asked Questions 12/4/17 Q2 TLS 1.0 Disablement Frequently Asked Questions 12/4/17 Executive Summary Q2 will be disabling the TLS 1.0 encryption protocol in favor of TLS 1.1 or higher on May 1, 2018. TLS is a security protocol

More information

MTAT Research Seminar in Cryptography The Security of Mozilla Firefox s Extensions

MTAT Research Seminar in Cryptography The Security of Mozilla Firefox s Extensions MTAT.07.019 Research Seminar in Cryptography The Security of Mozilla Firefox s Extensions Kristjan Krips 1 Introduction Mozilla Firefox has 24.05% of the recorded usage share of web browsers as of October

More information

Browser Settings & System Requirements

Browser Settings & System Requirements ILAI I I 1 1 ~T I ta~ ~-~-4es: ~ TxEIS Firefox Download and Internet Option Settings Go to: httd://www.mozilla.com/en-us/firefoxl Click on Firefox 3.6 Free Download 3.6.13 for Windows, English (US). Select

More information

manaba+r Report Examination Manual [For Students]

manaba+r Report Examination Manual [For Students] manaba+r Report Examination Manual [For Students] Contents 1. Report Examination... 1 1.1. Courses with Report Examinations... 1 1.2. Report Topic Announcement Method... 1 1.3. Report Submission... 1 1.4.

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

TxEIS System Requirements

TxEIS System Requirements The System Requirements document includes settings that are recommended in order to utilize the TxEIS system at its fullest potential on any personal computer, including screen resolution and Internet

More information

Looking at the Internet with Google Chrome & Firefox. Scoville Memorial Library Claudia Cayne - September, 2010

Looking at the Internet with Google Chrome & Firefox. Scoville Memorial Library Claudia Cayne - September, 2010 Looking at the Internet with Google Chrome & Firefox Scoville Memorial Library Claudia Cayne - ccayne@biblio.org September, 2010 Google Chrome & Firefox are web browsers - the decoder you need to view

More information

Learning Center Computer and Security Settings

Learning Center Computer and Security Settings Learning Center Computer and Security Settings Learning Center Computer Settings Please Note: To allow your computer to communicate most effectively with the Learning Center, and update your training record

More information

Copyright

Copyright 1 SECURITY TEST Data flow -- Can you establish an audit trail for data, what goes where, is data in transit protected, and who has access to it? Data storage -- Where is data stored, and is it encrypted?

More information

Opera Mini Manual For Android Tablet Internet

Opera Mini Manual For Android Tablet Internet Opera Mini Manual For Android Tablet Internet Download Opera Mini for your Android tablet now. Enjoy faster and cheaper internet with Opera Mini, one of the world's most popular mobile browsers. Opera

More information

AT&T Endpoint Security

AT&T Endpoint Security AT&T Endpoint Security November 2016 Security Drivers Market Drivers Online business 24 x 7, Always on Globalization Virtual Enterprise Business Process / IT Alignment Financial Drivers CapEx / OpEx Reduction

More information

Comodo. Cloud Antivirus. User Guide. Software Version Guide Version

Comodo. Cloud Antivirus. User Guide. Software Version Guide Version Comodo Cloud Antivirus Software Version 1.14 User Guide Guide Version 1.14.111717 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Table of Contents 1. Introduction to Comodo

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

Outline. Web browsers & Web servers

Outline. Web browsers & Web servers Web browsers & Web servers 1 Outline Goals and Objectives Topics headlines Introduction Finding a web page Browser Tasks Top browsers Browser window structure Internet Explorer Netscape / Mozilla Opera

More information

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE SESSION ID: SPO2-W12 A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE Frank Bunton VP, CISO MedImpact Healthcare Systems, Security @frankbunton Larry Biggs Security Engineer III - Threat

More information

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage PRO Not just an app, but a friend for your phone. Product Highlights Fonetastic is an all-in-one app for Android devices. Built with multiple productivity and security features, it enhances your device

More information

Recommended Browser Settings

Recommended Browser Settings Recommended Browser Settings Internet Explorer Settings (PC) Mozilla Firefox Settings (PC) Mozilla Firefox Settings (Mac) Safari Settings (Mac) Chrome Settings (PC) Infinite Campus recommends modifying

More information

TLS 1.2 Browser Compatibility

TLS 1.2 Browser Compatibility TLS 1.2 Browser Due to security reasons, CUB Net banking site will be disabled on browser with SSL 1.0, SSL 2.0, SSL3.0 and TLS 1.0. The Net banking site will work on browsers with TLS 1.2 support. If

More information

ATLANTICARE HEALTH-E YOU PATIENT PORTAL

ATLANTICARE HEALTH-E YOU PATIENT PORTAL the WE RESPECT YOUR PRIVACY WE PROTECT YOUR PERSONAL INFORMATION is designed to help you be a more involved partner in your own healthcare. The portal makes it easy to contact your AtlantiCare team of

More information

Portal Recipient Guide For Virtual Cabinet

Portal Recipient Guide For Virtual Cabinet Portal Recipient Guide For Virtual Cabinet Contents 1 Introduction... 3 2 Account Activation... 3 3 Forgotten Password... 6 4 Authenticating your Device & Browser... 9 5 Troubleshooting... 13 Page 2 of

More information

WorldNow Producer. Requirements Set-up

WorldNow Producer. Requirements Set-up WorldNow Producer Requirements Set-up Table of Contents Introduction... 3 1. System Requirements... 3 2. Set-up Producer URL as a 'Trusted Site' (Internet Explorer only)... 4 3. Enable JavaScript in your

More information

How To Stop Avg Search Appearing In New Tabs On Google Chrome

How To Stop Avg Search Appearing In New Tabs On Google Chrome How To Stop Avg Search Appearing In New Tabs On Google Chrome I'm not completely sure when it started, but new tabs seem to randomly open up when I click somewhere while working on chrome. You will opjust

More information

PRINTING IN ESCRIBE...2

PRINTING IN ESCRIBE...2 PRINTING IN ESCRIBE...2 PRINTING FROM MOZILLA FIREFOX...2 ALLOWING POPUPS IN MOZILLA FIREFOX...3 PRINTING FROM GOOGLE CHROME...4 ALLOWING POPUPS IN GOOGLE CHROME...5 PRINTING FROM APPLE SAFARI...6 ALLOWING

More information

Artificial Intelligence Drives the next Generation of Internet Security

Artificial Intelligence Drives the next Generation of Internet Security Artificial Intelligence Drives the next Generation of Internet Security Sam Lee Regional Director sam.lee@cujo.com Copyright 2017 CUJO LLC, All rights reserved. Artificial Intelligence Leads the Way Copyright

More information

FFIEC Guidance: Mobile Financial Services

FFIEC Guidance: Mobile Financial Services FFIEC Guidance: Mobile Financial Services Written by: Jon Waldman, CISA, CRISC Partner and Senior Information Security Consultant Secure Banking Solutions, LLC FFIEC Updates IT Examination Handbook to

More information

Browser-Related Issues Clearing Cookies and Cache

Browser-Related Issues Clearing Cookies and Cache Browser-Related Issues Clearing Cookies and Cache Contents Internet Explorer... 2 Microsoft Edge... 3 Mozilla Firefox... 4 Mozilla Firefox (Smartphone/Tablet)... 5 Google Chrome... 6 Google Chrome (Smartphone/Tablet)...

More information

Coordinated Disclosure of Vulnerabilities in McAfee Security Android

Coordinated Disclosure of Vulnerabilities in McAfee Security Android Coordinated Disclosure of Vulnerabilities in McAfee Security Android 4.8.0.370 1 Executive summary Researchers of MRG Effitas tested the McAfee Security Android application. During use, we came across

More information

Content Security Policy

Content Security Policy About Tim Content Security Policy New Tools for Fighting XSS Pentester > 10 years Web Applications Network Security Products Exploit Research Founded Blindspot Security in 2014 Pentesting Developer Training

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Browser Settings. Updated 4/30/ SSF

Browser Settings. Updated 4/30/ SSF Browser Settings Updated 4/30/2014 - SSF Contents How to Locate the Online Banking URL... 3 Initial Steps for Browser Settings... 8 Internet Explorer... 9 Firefox... 13 Chrome... 18 Safari 6.0.5 and up...

More information

Sign-in with UM CaneID

Sign-in with UM CaneID Sign-in with UM CaneID Section 1.1: Overview When you need to sign in with your CaneID to access application such as Workday, CaneLink, Box, and many others, you will be authenticated by the UM Single

More information

PROTECTION SERVICE FOR BUSINESS. Datasheet

PROTECTION SERVICE FOR BUSINESS. Datasheet PROTECTION SERVICE FOR BUSINESS Datasheet Protection Service For Business is one of the world s leading multi-endpoint security solutions. It is the only endpoint security solution on the market that combines

More information

Comodo. Cloud Antivirus. User Guide. Software Version Guide Version

Comodo. Cloud Antivirus. User Guide. Software Version Guide Version Comodo Cloud Antivirus Software Version 1.11 User Guide Guide Version 1.11.050317 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Table of Contents 1. Introduction to Comodo

More information

Frequently Asked Questions

Frequently Asked Questions Application and Document Sharing, page 1 Hosting, Joining, and Setting up Meetings, page 2 Joining a WebEx Meeting or Playing Back a Meeting Recording on Chrome and Firefox, page 4 Cisco WebEx for Mobile

More information

NICE Desktop Cloud Visualization. User Guide

NICE Desktop Cloud Visualization. User Guide NICE Desktop Cloud Visualization User Guide NICE Desktop Cloud Visualization: User Guide Copyright 2018 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade

More information

SAM Assessment, Training and Projects for Microsoft Office

SAM Assessment, Training and Projects for Microsoft Office SAM Assessment, Training and Projects for Microsoft Office December 2015 System Requirements Contents Overview 2 Introduction 2 System Requirements 3 Workstation Requirements 3 Setting Up SAM Workstations

More information

FIREFOX MENU REFERENCE This menu reference is available in a prettier format at

FIREFOX MENU REFERENCE This menu reference is available in a prettier format at FIREFOX MENU REFERENCE This menu reference is available in a prettier format at http://support.mozilla.com/en-us/kb/menu+reference FILE New Window New Tab Open Location Open File Close (Window) Close Tab

More information

Portal Recipient Guide. The Signature Approval Process

Portal Recipient Guide. The Signature Approval Process Portal Recipient Guide The Signature Approval Process Contents 1 Introduction... 3 2 Account Activation... 3 3 Document Signing... Error! Bookmark not defined. 4 Authenticating your Device & Browser...

More information

Version Release Date: September 5, Release Client Version: Release Overview 7 Resolved Issues 8 Known Issues 8

Version Release Date: September 5, Release Client Version: Release Overview 7 Resolved Issues 8 Known Issues 8 SpringCM Edit for Windows Version 1.5 Release Notes January 2015 Table of Contents Version 1.5 5 Release Date: January 19, 2015 5 Release Client Version: 1.5.16 5 Release Overview 5 Enhancements 5 Silent

More information

Configuring Microsoft Edge Browser By Tom Krauser

Configuring Microsoft Edge Browser By Tom Krauser Configuring Microsoft Edge Browser By Tom Krauser Browsers are the interface between the computer and internet. They provide the frame in which the website content is displayed. Having more than one browser

More information

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved. Avanan for G Suite Technical Overview Contents Intro 1 How Avanan Works 2 Email Security for Gmail 3 Data Security for Google Drive 4 Policy Automation 5 Workflows and Notifications 6 Authentication 7

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

RSA Web Threat Detection

RSA Web Threat Detection RSA Web Threat Detection Online Threat Detection in Real Time Alaa Abdulnabi. CISSP, CIRM RSA Pre-Sales Manager, TEAM Region 1 Web Threat Landscape In the Wild Begin Session Login Transaction Logout Web

More information

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to VMWare AirWatch User Guide for Web Browser You can access your AirWatch Files from a web browser. How to login AirWatch Cloud Storage? 1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari)

More information

Polycom RealPresence Cloud

Polycom RealPresence Cloud 1.1 April 2016 3725-20316-001D Frequently Asked Questions Polycom RealPresence Cloud Contents RealPresence Cloud Frequently Asked Questions (FAQs)...2 General Usage...2 Bandwidth Requirements...4 Microsoft

More information

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013 Protecting your Security and Privacy on the Web Tony Brett Head of IT Support Staff Services IT Services 11 March 2013 Agenda Why bother? Common data leaks Email security Viruses & Trojans Phishing Why

More information

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture

More information

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE

More information

Delete Browsing History

Delete Browsing History Delete Browsing History Occasionally trading partners will need to clear or delete their browsing history, cookies and website data in order for their computers to be compatible with the USVI Medicaid

More information