2. INTRODUCTION
• Browser security is the application of Internet
security to web browsers in order to protect
networked data and computer systems from
breaches of privacy or malware.
• Security exploits of browsers often use JavaScript
sometimes with XSS sometimes with a secondary
payload using Adobe Flash Security exploits can also
take advantage of vulnerabilities that are commonly
exploited in all browsers .
3. BROWSER
• A web browser is a software application for
retrieving, presenting and traversing
information resources on the World Wide Web.
An information resource is identified by a URL
that may be a web page, image, video or other
piece of content. Hyperlinks present in resources
enable users easily to navigate their browsers to
related resources.
4. SECURITY
• Computer security or IT security is the
protection of computer systems from the theft
and damage to there
hardware, software or information, as well as
from disruption or misdirection of the services
they provide
5. WHAT IS PHISHING?
• Phishing is the attempt to acquire sensitive
information such as usernames, passwords, and
credit card details directly from users.
8. HOW TO PREVENT PHISHING ATTACK
• The browser settings should be changed to prevent
fraudulent websites from opening.
• Many websites require users to enter login
information while the user image is displayed.
• To protect against spam mails, spam filters can be
used.
• Changes in browsing habits are required to prevent
phishing. If verification is required, always contact
the company personally before entering any details
online.
9. CONCLUSION
• Browsers are at the heart of the Internet experience, and
as such they are also at the heart of many of the security
problems that plague users and developers alike.
• As the sensitivity of internet usage increased concerns
about security, fraud and attacks became important
• There are limits to what a browser developer can
compensate for, and browser users will not always accept
the constraints of security that a browser establishes
• The job of browser developers, network administrators,
and browser users is to modulate those three quantities
to minimize the number of successful attacks.