YE (2010): "Preventing Drive-by Download
via Inter-Module Communication Monitoring", Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security: 124-134.
BLADE is an effective countermeasure against all forms of drive-by download
malware installs because it is vulnerability and exploit agnostic," added Lee.
Users at risk for this drive-by download
have either the Windows 2000 or XP operating system, or Windows server 2003.
The attack is a typical drive-by download
, where hackers infect existing Web sites - or set-up their own rogue Web sites - and then redirect or trick users into going to them.
Ericom Shield is a secure browsing solution providing organizations with the highest level of Internet security and protection against web-borne threats including ransomware, drive-by downloads
and zero-day attacks.
, cloaked redirects and scams stems in part from miscreants
Keep the endpoints and software well-patched to protect against drive-by downloads
that exploit vulnerable software and applications.
These scans include searching for defacement, database vulnerabilities, application vulnerabilities, and drive-by downloads
Although removable media and local networks are still the primary method for spreading malware in the region, there is an increase in the use of drive-by downloads
which exploit vulnerabilities in browsers and their plugins.
Meanwhile, drive-by downloads
hosting exploits (often used by malvertising and watering hole attacks), Dynamic DNS (often used as an evasion technique against IP blacklisting) and Mobile Threats are new individual categories added to enhance protection and improve reporting granularity.
They are protected from popular threat vectors including those aimed at file system entry, drive-by downloads
, or system exploits and vulnerabilities.
attacks have been around for a number of years.
Of the Web-based malware attacks that Dasient's system collected information on, 59 per cent are drive-by downloads
and 41 per cent are fake antivirus warnings, also called "scareware.
Modern smart phones are suspect to malicious activity such as phishing, scam websites and even drive-by downloads
where malicious codes such as Trojans can be downloaded to the device.
The two main channels by which these threats proliferate remain the Internet and drive-by downloads