CE ÎNSEAMNĂ DRIVE-BY DOWNLOAD ÎN ENGLEZĂ?
Descărcați unitate
Descărcarea prin descărcare înseamnă două lucruri, fiecare cu privire la descărcarea neintenționată a software-ului de calculator de pe Internet: ▪ Descărcări pe care o persoană autorizată, dar fără a înțelege consecințele. ▪ Orice descărcare care se produce fără cunoștințele unei persoane, adesea un virus de calculator, programe spion, malware sau infracțiuni. Descărcări prin descărcare se pot întâmpla atunci când vizitați un site web, vizualizați un mesaj de poștă electronică sau făcând clic pe o fereastră pop-up înșelătoare: făcând clic pe fereastră în convingerea greșită că, de exemplu, un raport de eroare al calculatorului sistemul în sine este recunoscut sau că se respinge un pop-up de publicitate inofensiv. În astfel de cazuri, "furnizorul" poate pretinde că utilizatorul "a dat acordul" descărcării, deși, de fapt, utilizatorul nu știa că a inițiat descărcarea software-ului nedorit sau rău intenționat. Site-urile web care exploatează vulnerabilitatea Windows Metafile pot oferi exemple de descărcări de tip drive-by de acest tip. Hackerii folosesc tehnici diferite pentru a bloca codul rău intenționat, astfel încât software-ul antivirus să nu-l poată recunoaște. Codul este executat în iframe ascunse și poate merge nedetectat. Un drive-by install este un eveniment similar.
Definiția drive-by download în dicționarul Engleză
Definiția descărcării prin descărcare în dicționar este o incidență a unui program nedorit care este descărcat automat pe un computer, adesea fără cunoștințele utilizatorului.
CĂRȚI ÎN ENGLEZĂ ÎN LEGĂTURĂ CU «DRIVE-BY DOWNLOAD»
Descoperă întrebuințarea
drive-by download în următoarea selecție bibliografică. Cărți în legătură cu
drive-by download și extrase din aceasta pentru a furniza contextul de întrebuințare al acestuia în literatura Engleză.
1
INetSec 2009 - Open Research Problems in Network Security: ...
IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009,
Revised Selected Papers Jan Camenisch, Dogan Kesdogan. Mitigating Drive-By
Download Attacks: Challenges and Open Problems Manuel Egele1, Engin
Kirda2, ...
Jan Camenisch, Dogan Kesdogan,
2009
2
Security Awareness: Applying Practical Security in Your World
Unlike a traditional download that asks for the user's permission to perform an
action, a drive—by download can be initiated simply by visiting a Web site. CNET
.com, ABC News' homepage, and Walmart.com have all at one time or another ...
3
Detection of Intrusions and Malware, and Vulnerability ...
Drive-by download attacks are among the most common methods for spreading
malware today. These attacks typically exploit memory corruption vulnerabilities
in web browsers and browser plug-ins to execute shellcode, and in consequence
...
Ulrich Flegel, Danilo Bruschi,
2009
... softwaredesigned to infiltrateacom- puter system. The expression drive-by
download is used in four increasingly strict meanings: Malware for profit: spyware
, botnets, keystroke loggers, and dialers. 42 Drive-by download Drive-by
download.
5
Untangling the Web: The Nsa's Guide to Gathering Information ...
If your computer's security settings are lax, it may be possible for drive-by
downloads to occur without any action on your part." “Drive-by Download,"
SearchSlVlB.com, <hip:l/searchsmb.techtarqet.com/sDefinition/O,,sid44
qci887624,00.html> ...
6
Vulnerability Analysis and Defense for the Internet
an example of a Gator drive-by download attempt, along with a typical security
warning dialog box. Drive-by downloads are a deceptive and dishonorable
method of causing or encouraging users to obtain software for at least two
different ...
Abhishek Singh, B. Singh, H. Joseph,
2008
7
Phishing: Cutting the Identity Theft Line
Then I think “What was it that the popup just said?” The Drive-By Download A
less scrupulous variation of automatic installation is fast becoming a very popular
means of distributing spyware. Called a drive-by download, it installs its junk on a
...
Rachael Lininger, Russell Dean Vines,
2005
8
CompTIA Security+ Certification Study Guide: Exam SY0-201 3E
According to research by Symantec in 2008, there were more than 18 million
drive-by-download attacks.5 Figure 3.3 illustrates a drive-by-download attack.
Drive-by-download attacks apply to many popular Web browsers including IE
and ...
A drive-by download is another avenue through which a user's machine may
become spyware-enhanced. Taking a broad definition, a drive- by download is
where a user browsing a web page has software downloaded and installed as a
side ...
10
Recent Advances in Intrusion Detection: 13th International ...
Software flaws in applications such as a browser may be exploited by attackers to
launch drive-by-download (DBD), which has become the major vector of malware
infection. We describe a host-based detection approach against DBDs by ...
Somesh Jha, Robin Sommer, Christian Kreibich,
2010
ȘTIRI NOI CARE INCLUD TERMENUL «DRIVE-BY DOWNLOAD»
Află ce ziare naționale și internaționale au scris despre și cum este întrebuințat termenul
drive-by download în contextul următoarelor știri.
Ad fraud Trojan updates Flash Player so that other malware can't get in
Drive-by download attacks are particularly nasty because they're usually launched from trusted, legitimate websites that have either been ... «PC Advisor, Iul 15»
CryptoWall 3.0 Prompt Delivery via RIG Exploit Kit and Google Drive
In a fresh drive-by download campaign spotted by researchers at Heimdal Security, the delivery mechanism for the crypto-malware involves ... «Softpedia News, Iul 15»
Android Accessibility Feature Leveraged to Steal Data
On the upside, the surveillance tool cannot be delivered on an Android device seamlessly, such as in the case of a drive-by download attack, ... «Softpedia News, Iul 15»
Patched Apple QuickTime Vulnerability Details Disclosed
This bug seems ripe in particular for exploit via malvertising or drive-by download, similar to how a Flash zero-day is used in targeted attacks. «Threatpost, Iul 15»
Latest Flash hole already exploited to deliver ransomware - update …
Instead of battling to build a specific exploit into your own malware so you can attack unsuspecting users with a drive-by download, you just buy ... «Naked Security, Iun 15»
Stolen Government Agency Passwords Easy to Find Online
Since most of the stolen credentials were pilfered in hacks or breaches of third-party sites popped in drive-by download attacks, for example, ... «Threatpost, Iun 15»
How to protect your data from computer hijackers
Ransomware can also be installed in a “drive-by download,” which happens when a user visits an infected site or clicks on a popup that ... «The Tennessean, Iun 15»
How to protect your network from ransomware
... naïve browsing practices, or by clicking on phishing emails or spam that has attachments or links to drive-by download sites or botnets. «Enterprise Innovation, Iun 15»
Adf.ly Service Used to Serve Infostealer via Drive-By Download Attack
Security researchers identified a new malvertising campaign leveraging advertising service Ad.fly to redirect users to HanJuan exploit kit and ... «Softpedia News, Iun 15»
Child Exploitation & Assassins For Hire On The Deep Web
... sites that those sites linked to, and found that most fell into three main categories: 33.7 percent were disease vector (drive-by download) sites, ... «Dark Reading, Iun 15»