Cisco CloudCenter: Get the Hybrid IT Advantage

Malicious Active Content

Definition - What does Malicious Active Content mean?

Malicious active content refers to malicious code that is inserted into scripting languages. This code is typically downloaded onto a Web browser and launched without authorization on an unknowing user’s local system. Malicious active content is used to embed worms and viruses, resulting in the collection of local user information as well as other computer issues. Vigorous scripting language such as JavaScript has been known to be the most vulnerable to malicious active content attacks. Interactive websites can also contain malicious active content. Weather maps and stock ticking can be vulnerable to malicious active content, as can embedded objects and opt-in features like Internet polls. What is particularly destructive about malicious active content is that by the time a computer has been infected with it, it is already too late to fix the problem.

Techopedia explains Malicious Active Content

Malicious active content and legitimate active content can be hard to differentiate. Hex and UTF-8 formats within JavaScript make detecting malicious active content nearly impossible, as the attacker can bypass some of the policy rules of active content protection tools such as ProxySG. Also this type of appliance-style device can ward off many malicious active content attacks, computer experts recommend installing layers of protection because some are better suited to certain scripting languages than others.

Plug-ins such as ActiveX are notorious for their vulnerability to malicious active content. In addition, malicious active content can steal a password or pin and later access a website with confidential information while making it look as though it was accessed by the authorized user. This can make it even harder to track whether malicious active content has been used in the attack.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.