Microsoft Security Blog: What You Should Know About Drive-By Download Attacks - Part 2
By Tim Rains
12 Dec 2011

In part one of this two-part series, I focused on how drive-by download attacks work. These attacks can be complicated because they can use multiple levels of redirection enabling components of an attack to be hosted on compromised systems in different parts of the world. Despite the relative sophistication of these attacks, there are many things you can do to protect the systems you manage from being compromised by this type of attack. In this article I share some of the things you can do to protect yourself from drive-by download attacks.

Click the URL above to read the full article
Comments: 0
Votes:33