World Wide Web Day 2023: Evolution of Web Browser Security - From Vulnerability to Vigilance

Update: 2023-08-01 11:58 IST

In today's modern world, everything is possible with the help of the Internet. We have information available at our fingertips using the Internet. But do you know how it is possible? Well, credit goes to the World Wide Web (www) system.

World Wide Web is the full form of www used in website links. The World Wide Web connects all the world's websites to the Internet. All the resources, including web pages, documents, files, and audio, that we can access through the Internet are possible thanks to the World Wide Web. All web browsers, search engines, and websites are connected to the World Wide Web; this is how we can find information worldwide through the Internet.

ADVERTISEMENT

Satnam Narang, Sr. Staff Research Engineer, Tenable, shares a comment on this World Wide Web Day, He says, “On this World Wide Web Day, it’s important to recognise the significant strides made in web browser security. Towards the earlier part of this century, browsers were problematic, as flaws in Microsoft Internet Explorer, the most popular browser at the time, as well as browser plug-ins like Microsoft ActiveX and Adobe Flash, provided attackers with reliable entry points onto the systems of internet users.

“Decades later, through improvements in technology such as sandboxing, which isolates the ability to access the underlying system, cybercriminals have broadly pivoted away from web browsers as a primary threat vector. That said, advanced persistent threat (APT) groups remain determined to find what is known as vulnerability chains, which pair two or more vulnerabilities, to escape browser sandboxes and reach the underlying system. These APT groups aren’t interested in targeting the average consumer.

“While web browsers were the de facto way of accessing the world wide web, the evolution of mobile phones has also evolved how we interact with the web, primarily through the use of apps. Now, threat actors may develop malicious apps and post them on official and unofficial app stores, which can enable them to financially benefit from their victims by signing them up for premium services or stealing sensitive information from their devices.”

Tags:    

Similar News