Businesses should invest in technology solutions that have the ability to automate acceleration of web content such as a mobile
browser cache that offers site owners the ability to configure persistent, reliable storage for caching objects from their site on mobile devices, enabling significant acceleration also for mobile users.
A variation of the Drive-by-Download attack is the Drive-by-Cache attack that can exploit
browser cache functionality in order to execute malware.
For example, Web
browser cache cleaning and host-integrity checks purge browser-and application-specific caches upon completion of the user's session, validate the remote node's security status and configuration settings prior to enabling network access, and create an encrypted workspace on the remote node to help ensure against information leakage.
only to be triumphantly trumped by the exuberance of the third line: Prevent work boredom: Clean
browser cache files!
The Attachment Wiper product operates by deleting all forms of temporary files,
browser cache, downloaded files and pages, cookies, history information, user credentials and other information that could be recorded by a web browser throughout the course of an SSL VPN session.