About us
The product has been added to the shopping cart Show shopping cart
Your current path:

How to protect yourself against drive-by-exploits

Table of contents

Drive-by-exploits

So-called drive-by exploits refer to the automated exploitation of security vulnerabilities on a PC and are one of the main sources of computer infections.

Vulnerabilities in the browser, browser plug-ins or operating system are exploited to install malware such as Trojans on the PC unnoticed when a website is viewed without any further user interaction.

Infections even without a mouse click

The Federal Administration’s Computer Emergency Response Team (CERT-Bund) is currently becoming aware of more than 20 websites hosted in Germany every week that have been manipulated by attackers and lead to drive-by exploits.

Even when visiting websites that are considered trustworthy, there is a risk of the PC being infected via specially manipulated advertising banners. Attackers regularly compromise server applications of marketing service providers so that malicious code is delivered with the advertising banners, which leads to drive-by exploits. It is not even necessary to click on the advertising banner to activate the malicious code.