Microsoft Windows Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 15 August 2012

HTML 5 is not a safe plateform?

Posted on 11:54 by Unknown
An increasingly popular web language will be the next big target for cybercriminals, according to a security firm.
HTML 5 is being developed to improve the look of websites, remove the need for plug-ins such as Java and Flash, and bring the storage capacity of the cloud to the browser.
It is still in development but some applications already support it.
Because it is new, it is attractive to cybercriminals, said Sophos.
Super cookies "This is potentially going to be quite painful," said James Lyne, director of technology strategy at the security firm.
"It is more than a web language. Much more data can be stored in the browser which means that criminals can now attack the browser to steal data."
Traditionally browsers have stored relatively small amounts of "sticky" data, limited mainly to cookies which track the websites that people have visited.
The fact that HTML 5 allows more data to be stored in the browser means firms and cybercriminals could create super-cookies to track people's web behaviour.
Some malware techniques have faded out of fashion because patches have been found for them.
HTML 5 makes some ripe for renewed exploitation, thinks Mr Lyne.
Chief among them is clickjacking, a relatively simple malware technique used to persuades users to click on a link often via a pop-up box.
With previous web standards, developers could create code which questioned where click instructions came from in order to prevent clickjacking.
Tracking people HTML 5 hides a lot of this detail from software writers making it harder to distinguish between good and bad sites.
"By building this wall it is hampering developers' ability to write secure code," said Mr Lyne.
The other major security flaw for HTML 5, identified by Sophos, is the fact that it is built to integrate with mobile features such as GPS.
It means that a mobile phone browser will be able to identify a person's location, as long as it is given permission, straight out of the box.
But, said Mr Lyne, the permissions for who had access to this were currently "poorly defined".
"Some sites, such as Google Maps, you might be happy to know where you are while others you wouldn't want to know your location."
Adobe Flash HTML 5 is already being widely adopted, particularly in the mobile world.
Software developer Adobe Systems recently announced it was ending development of its Flash Player plug-in for mobile devices.
Flash has traditionally been used to run movies, games and other applications but Adobe said it now believes that HTML 5 technology offered the "best solution" because it was "universally supported".
Google is also a fan, and uses it in its Gmail service to allow users to drag and drop files into messages. This functionality is currently only supported by the latest Chrome and Firefox browsers.
While the web standard brings new security issues, it will also solve others, thinks Mr Lyne.
"It eliminates the need for Flash and other external products that have been littered with vulnerabilities," he said.
Efforts must now be made to finish the design as soon as possible, he added.
"It is critical to get a full spec for HTML 5 and there needs to be a serious focus on making sure the browser is secure."
HTML 5 is being developed by the World Wide Web Consortium (W3).
QR pornography
Sophos said other targets for cybercriminals in 2012 would include the use of near-field communication (NFC), which allowed users to wave a mobile phone at a NFC-enabled reader in order to make small purchases.
"The mobile phone becomes a digital credit card which makes it really worth hacking," said Mr Lyne.
Some of the threats for the coming year are lower-tech - such as malware stickers placed over the QR codes used by firms to allow smartphone owners access to content.
QR codes typically appear on posters. Once scanned with a mobile phone and opened with a QR reader, app users can get access to a range of content.
Train stations, for example, use QR codes to allow passengers to download timetables.
But cybercriminals are exploiting their popularity by placing their own stickers on top of the QR codes to take people to more nefarious sites.
"I used one on a train station and it took me to a Russian porn site," said Mr Lyne.
Crime packs 2011 has been a bumper year for malware. Sophos said it received an average of 150,000 pieces of malicious code each day - a 60% increase on this time last year according to the firm.
Global cybersecurity spending is on track to exceed $60bn (£38bn) according to a study by consultancy firm PricewaterhouseCoopers.
The greater use of mobile devices and cloud computing were fuelling the growth, it said.
Increasingly security companies are working with the police to crack some of the most notorious cybergangs.
Sophos, for example, feeds bundles of malware generated by the same criminal gangs to the security services.
It has, according to Mr Lyne, never been easier for cybercriminals to set up in business, with crime packs offering a library of malware, readily available online.
"I found 27 such packs within an hour of searching on the public internet," he said.
Such crime packs also offer tips on how to avoid anti-virus software, as well as a dashboard to allow cyber criminals to see how well their malware is performing.
"We have moved from a situation where we were playing a game of draughts with a slightly drunk opponent to a skilled chess player who knows all the tricks we know," said Mr Lyne.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • how linux is built
  • Samsung Electronics has bought Boxee
    Samsung Electronics has confirmed its purchase of Boxee on Wednesday for its  smart TVs .  Samsung plans to use this acquisition as a way to...
  • Another Microsoft Guru Steps Down
    Microsoft announced on Monday that company veteran Craig Mundie has stepped down from his post as chief of research and will retire in th...
  • Dr. Dre Top As The New Hip-Hop’s Top Earner
    Six years ago Dr. Dre was walking   for more click here
  • Microsoft new Windows, tablet
    US computing giant Microsoft on Tuesday gave an early peek to the key Chinese market of its new tablet computer and Windows 8 software, pr...
  • Thought words
    “ Greatness lies not in being strong, but in the right using of strength. ” — Henry Ward Beecher
  • How to Move Your Email to Another Mac
    If you use Apple's Mail application, there will probably come a time when you'll want to move your email messages and email account...
  • How To SSH Hop With Key Forwarding from Windows
    In this guide we’ll explain how to SSH to a Linux machine from Windows with your public key, using Putty & Winscp. In addition, we wil...
  • Japan's largest solar and wind power project breaks ground
    Seven Japanese companies have been celebrating the ground breaking of their solar and wind power project at a ceremony held today at the ...
  • How to Recover a Deleted File
    It’s happened to most of us. You delete a file and realize you need it back. This guide will explain when you can get that file back and how...

Categories

  • 3 D printers
  • 360s
  • amazon
  • android
  • animation
  • apple
  • bing
  • book
  • boxee
  • browser
  • china
  • chrome
  • console
  • dicaprio
  • domain
  • ecommerce
  • facebook
  • ferrari
  • finland
  • gadget
  • galaxy
  • games
  • gmail
  • google
  • hosting
  • HTC
  • internet
  • ipad
  • iphone
  • iphoto
  • iwatch
  • japan
  • keyborad
  • lenovo
  • linux
  • lunar
  • microsoft
  • mobile
  • moon
  • movil
  • ms
  • names
  • new tech
  • Nokia
  • online
  • password
  • pc
  • phone
  • retails
  • samsung
  • search
  • smartphone
  • software
  • space
  • tablet
  • tech
  • text messages
  • track
  • trip
  • usres
  • web
  • whatsapp
  • whois
  • window
  • words
  • xbox

Blog Archive

  • ►  2013 (160)
    • ►  December (1)
    • ►  November (9)
    • ►  September (5)
    • ►  August (8)
    • ►  July (19)
    • ►  June (12)
    • ►  May (23)
    • ►  April (3)
    • ►  March (5)
    • ►  February (18)
    • ►  January (57)
  • ▼  2012 (340)
    • ►  December (25)
    • ►  November (34)
    • ►  October (24)
    • ►  September (27)
    • ▼  August (26)
      • The speech that Nixon never gave: ‘In event of moo...
      • Senators banned Facebook Co-Founder Saverin from A...
      • Senators ban Saverin from America: Don't come back...
      • 1st man to walk on the moon, dies at 82: Armstrong
      • Who Will Be The First To Build Next Supersonic Pas...
      • Smartphone users exceed 30 million in S. Korea
      • Apple-Samsung To End Their Dispute
      • 6 under $500 laptops you can buy at yahoo shop online
      • Apple's iPhone Is Now Worth More Than All Of Micro...
      • The New Samsung Galaxy Note 10.1 tablet
      • HTML 5 is not a safe plateform?
      • Neo Geo Game makes come back
      • How to Uninstall the Vuze Toolbar
      • Military test hypersonic jet that could fly across...
      • Gadget: Israel tests SMS missile alerts
      • Thought words
      • What Google Employees Gets When They Die
      • China to cut production of rare earths: Minerals
      • word of thoughts today
      • Mar rover curiosity has landed on Planet Mars
      • The man who will be driving mars rover 2012
      • Mars rovers to land 6th of august 2012
      • 83 million Facebook accounts are fakes and dupes
      • Is american flag still standing on moon?
      • Snoop Dogg is now Reggae artist and born again
      • World's Largest Yachts
    • ►  July (46)
    • ►  June (83)
    • ►  May (42)
    • ►  April (33)
Powered by Blogger.

About Me

Unknown
View my complete profile