248 Chapter 10 ■ Social Engineering
Using a Pop-up Blocker A modern browser recognizes potentially dangerous pop-ups, lets
you know when it blocks a pop-up, and offers the option to selectively block each pop-up
as needed.
Heeding Unsafe Site Warnings If you go to a website that is fraudulent, untrusted, or has
known security problems, the browser should prevent the site from loading.
Integrating with Antivirus Software Your browser should work with a resident antivirus
program to scan downloaded files for security threats.
Using Automatic Updates Modern browsers typically update themselves to incorporate
fixes to flaws in the software and to add new security features.
Private Browsing This feature has become a staple of newer browsers, including all the
popular browsers such as Chrome, Internet Explorer, Firefox, and others. This mode
prevents the saving of specific types of information in the browser such as search history as
well as preventing certain behavior from being observed.
Changing Online Habits No software can compensate for poor Internet safety habits.
Tools can help, but they cannot stop you from acting recklessly or carelessly online.
Take a moment to think about this last point and its value to you as an
ethical hacker. The average person parts with enormous amounts of
information nowadays through social networking and other means. Many
users of social-networking features think nothing of posting or providing
information that would be dangerous if it fell into the wrong hands.
Some common methods you should consider educating your user base or clients about
should include the following at the very least.
■ Exercise caution on unsecured wireless networks. The free Wi-Fi access at the coffee
shop down the street could cost you a lot if it is unsecured and open to the world. An
unsecured connection is an open network that allows anyone to connect. Information
passed from a laptop to the wireless router and vice versa can be intercepted by people
with the right tools because it is not encrypted. Additionally, network attacks can be
made from other computers connected to the network.
As you learned in our exploration of wireless networks, you should always
assume on public networks or unknown networks that someone may be
listening. This assumption, although it may be untrue in many cases, will
shape your thinking toward being more cautious with the information
you’re accessing on these networks.
■ Be careful accessing sensitive information in a public place. Even on a secured
connection or a VPN, people can see what you type on a laptop screen. You may reveal
sensitive information to a person walking by with a camera phone while you do your