Jump to content
Posted 07 October 2014 - 08:16 PM
Posted 08 October 2014 - 05:49 AM
The term drive-by download refers to the unintentional download of a virus or malicious software by visiting a compromised website that is running malicious code or an HTML-based email message that redirects to such a website. A drive-by download will usually exploit vulnerabilities (security flaws) in a browser, program, or operating system that is out of date.
Mitigating Drive-by Downloads
Malwarebytes Anti-Exploit (MBAE), formerly ExploitShield by ZeroVulnerabilityLabs, is a security program that runs in the background as a standard Windows Service and protects against zero-day exploits that target browser and application vulnerabilities, blocks unknown and known exploit kits and defends against drive-by download attacks.
MBAE provides three layers of exploit protection (against Operating System security bypasses, memory caller protection, application behavior protection). MBAE continuously monitors popular applications, preventing vulnerabilities in software and browsers from being exploited, blocks unknown and known exploit kits, proactively preventing the exploit from installing its payload before it can do damage. This means that it will protect against code execution that uses a certain vulnerability in an application. MBAE leaves a small footprint...meaning it is not intrusive, does not utilize a lot of system resources and does not use a signature database so there is no need for constant updating.
Malwarebytes Anti-Exploit Premium includes additional protecton (Shields) for PDF readers, Microsoft Office (Word, Excel, Powerpoint), Media players and allows the ability to add/manage custom shields.
MBAE protects the following applications: Mozilla Firefox, Google Chrome, Internet Explorer, Opera, Java, Adobe Acrobat, Adobe Reader, Foxit Reader, Microsoft Office Word, Microsoft Office Excel, Microsoft Office PowerPoint, Windows Media Player, VLC Media Player, Winamp Player, QuickTime Player, Windows Script Host and Windows Help.
Posted 08 October 2014 - 06:22 AM
The majority of computers get infected from visiting a specially crafted webpage that exploits one or multiple software vulnerabilities. It could be by clicking a link within an email or simply browsing the net, and it happens silently without any user interaction whatsoever.
Exploit Kits - Anatomy of an exploit kit
Exploit kits are a type of malicious toolkit used to exploit security holes found in software applications...for the purpose of spreading malware. These kits come with pre-written exploit code and target users running insecure or outdated software applications on their computers.
Posted 08 October 2014 - 06:29 AM
0 members, 0 guests, 0 anonymous users