What are drive-by download exploits?
The mere act of visiting a website results in the download of malicious software without user consent. This is drive-by download exploits. Of course you can choose not to visit questionable web sites and also those that have been tagged by other users as laden with malware.
In the drive-by exploit world, the most targeted application is the Adobe pdf reader accounting for more than half of exploits. The other applications in the study that are most exploited are Internet Explorer, Sun Java and Flash.
[tags malware,exploits]
[end]
The mere act of visiting a website results in the download of malicious software without user consent. This is drive-by download exploits. Of course you can choose not to visit questionable web sites and also those that have been tagged by other users as laden with malware.
In the drive-by exploit world, the most targeted application is the Adobe pdf reader accounting for more than half of exploits. The other applications in the study that are most exploited are Internet Explorer, Sun Java and Flash.
[tags malware,exploits]
[end]
Comments