spyware

(redirected from Drive-by download)
Also found in: Dictionary, Encyclopedia, Wikipedia.
Related to Drive-by download: Rootkit
Graphic Thesaurus  🔍
Display ON
Animation ON
Legend
Synonym
Antonym
Related
  • noun

Words related to spyware

computer software that obtains information from a user's computer without the user's knowledge or consent

References in periodicals archive ?
YE (2010): "Preventing Drive-by Download via Inter-Module Communication Monitoring", Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security: 124-134.
BLADE is an effective countermeasure against all forms of drive-by download malware installs because it is vulnerability and exploit agnostic," added Lee.
Users at risk for this drive-by download have either the Windows 2000 or XP operating system, or Windows server 2003.
The attack is a typical drive-by download, where hackers infect existing Web sites - or set-up their own rogue Web sites - and then redirect or trick users into going to them.
Ericom Shield is a secure browsing solution providing organizations with the highest level of Internet security and protection against web-borne threats including ransomware, drive-by downloads and zero-day attacks.
drive-by downloads, cloaked redirects and scams stems in part from miscreants
Keep the endpoints and software well-patched to protect against drive-by downloads that exploit vulnerable software and applications.
These scans include searching for defacement, database vulnerabilities, application vulnerabilities, and drive-by downloads.
Although removable media and local networks are still the primary method for spreading malware in the region, there is an increase in the use of drive-by downloads which exploit vulnerabilities in browsers and their plugins.
Meanwhile, drive-by downloads hosting exploits (often used by malvertising and watering hole attacks), Dynamic DNS (often used as an evasion technique against IP blacklisting) and Mobile Threats are new individual categories added to enhance protection and improve reporting granularity.
They are protected from popular threat vectors including those aimed at file system entry, drive-by downloads, or system exploits and vulnerabilities.
Drive-by downloads attacks have been around for a number of years.
Of the Web-based malware attacks that Dasient's system collected information on, 59 per cent are drive-by downloads and 41 per cent are fake antivirus warnings, also called "scareware.
Modern smart phones are suspect to malicious activity such as phishing, scam websites and even drive-by downloads where malicious codes such as Trojans can be downloaded to the device.
The two main channels by which these threats proliferate remain the Internet and drive-by downloads.