Some of our users fell prey to recent drive-by attacks. What are the best strategies for preventing drive-by attacks?...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Are some browsers better at doing so than others? Are there browser add-ons we could implement to mitigate the threat?
A drive-by download attack on IE8 and below was patched, and enterprises should already have a plan in place for comprehensive patching to ensure browsers and all of the software on a system is updated. If you have software or applications that require older versions of IE, you can implement other security controls to prevent drive-by attacks. You will need to determine which controls best fit in your environment and block the most common attacks you see.
One additional security control for preventing a drive-by virus infection is using different Web browsers, and only using vulnerable versions of IE on the specific applications that require it. General purpose Web browsing could be done using an alternative Web browser like Firefox, Chrome, Opera, etc. All of these browsers usually have different security vulnerabilities than IE, and will also require periodic security updates. If you use an alternative Web browser, it should be included in your security plans. These browsers are typically updated faster and more frequently than IE, which helps reduce the risk from unpatched vulnerabilities.
For individually managed systems, using a Web browser that is self-updating or notifies you when an update is necessary ensures patches are applied. Enterprises may need to evaluate if this meets their security requirements, but automated rapid updates with security patches will help improve security with, generally, a minimum impact on functionality.
Dig Deeper on Web Application and Web 2.0 Threats
Related Q&A from Nick Lewis
MedSec and Muddy Waters Capital revealed serious flaws in IoT medical devices manufactured by St. Jude Medical. Expert Nick Lewis explains the ...continue reading
RIPPER malware has been found responsible for the theft of $378,000 from ATMs in Thailand. Expert Nick Lewis explains how this ATM malware works.continue reading
Researchers found that facial recognition systems can be bypassed with 3D models. Expert Nick Lewis explains how these spoofing attacks work and what...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.