SUMMARY This open source tool strictly controls what web browser can access, which stops web browser from loading harmful content - Phishing, Non-Secure HTTP, or whatever that's not in your whitelist. SITUATION "Security flaws in Google Chrome, Microsoft Edge, and Apple Safari were all successfully exploited... browsers as well as Windows, OS X, and Flash" http://ift.tt/1LvqXqt ATTACK Attacks have to make target's browser load attacker's website, which has two scenarios - send the link(phishing), or control a website that target will visit. The latter is difficult because web servers are usually(not always) much more secure than web browsers, and attackers simply don't know which websites. The former, Phishing, is "mainstream", because it's a lot easier: the address of email sender can be faked, the content of email can look 100% legitimate and compelling, and the URL can hide behind redirection service("dereferer" of email system, t.co, or whatever). SOLUTION Whitelist - for example, the whitelist contains Gmail, PayPal, Chase, GitHub, and Twitter. Attacker's website is not in the whitelist, so the harmful content does not reach browser, even if some users are "stupid enough" to click links from The Phishing Guy. URLs Project Home Page: http://ift.tt/1rlzC5S Source Code: http://ift.tt/1SleYZW HISTORY It's fork of HTTPS Only released in March: http://ift.tt/1LGFzTX And this is likely the last version - because the source code is so short and simple, maybe there is really no bug here! Let me hope so. Kind Regards,
Source: Gmail -> IFTTT-> Blogger
No comments:
Post a Comment