How a Harmless-looking Website Can Hack Into Your Computer, Steal Data

  • Deovrat 

When the news of firms lifting data from Facebook to manipulate the election in their favor came out, it sent the whole nation and globe into a frenzy. When the debate over social media platforms which should be protecting user data is important, there is still a bigger question on online security which looms.

There is still fear of cyber attack, online scamming of money through the online medium and hacking of data which have often perturbed the people.

We are often told not to click on apps which are unregulated in most ways, opening those Facebook quizzes or open those steamy emails which can affect your computer in the wrong way.

Do you know that a completely harmless website can affect and compromise you completely?

According to Microsoft’s security updates, there are namely a few vulnerabilities or five to be exact which exist in the Windows Operating System which can be affected by a sleazy website can take to get access of your computer.

As per the update, “a remote code execution vulnerability” exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploits the vulnerability could take control of the affected system’.

‘The attacker can then install programs; view, change, or delete data; or create new accounts with full user rights.’ If you are logged in using the administrative rights or you have those rights then the effects can be even greater during such attacks.

The news which can relax your fears is that Microsoft is launching its April Patch Tuesday, which addresses the vulnerability in Windows operating systems and some of the other products. Patch Tuesday or Update Tuesday is the date when the Microsoft Security Updates are released in regards to security patches for its software products.

And those people who disregard this message can be in threat for certain major web attacks and file sharing attacks as they are facing vulnerability.

In a web-based attack, a hacker or malicious software can host a website which can exploit this loophole, and then convince users to visit the website. there is no other way for a hacker to force the users to visit the website and the user cannot view the attacker-controlled content. The hacker would otherwise use some method to make the user take some action, typically by clicking on some link or instant messaging that can send the person to the attacker’s website or through an attachment sent through email.

In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to take advantage of and then convince users to open the document file.

Thus if you are a windows user, it is best advised to update the Patches as soon as you can. This will not ensure that you can never be hacked but would at least heighten the level of deterrence.

Leave a Reply

Your email address will not be published. Required fields are marked *