Some of our users fell prey to recent drive-by attacks. What are the best strategies for preventing drive-by attacks? Are some browsers better at doing so than others? Are there browser add-ons we could implement to mitigate the threat?
A drive-by download attack on IE8 and below was patched, and enterprises should already have a plan in place for comprehensive patching to ensure browsers and all of the software on a system is updated. If you have software or applications that require older versions of IE, you can implement other security controls to prevent drive-by attacks. You will need to determine which controls best fit in your environment and block the most common attacks you see.
One additional security control for preventing a drive-by virus infection is using different Web browsers, and only using vulnerable versions of IE on the specific applications that require it. General purpose Web browsing could be done using an alternative Web browser like Firefox, Chrome, Opera, etc. All of these browsers usually have different security vulnerabilities than IE, and will also require periodic security updates. If you use an alternative Web browser, it should be included in your security plans. These browsers are typically updated faster and more frequently than IE, which helps reduce the risk from unpatched vulnerabilities.
For individually managed systems, using a Web browser that is self-updating or notifies you when an update is necessary ensures patches are applied. Enterprises may need to evaluate if this meets their security requirements, but automated rapid updates with security patches will help improve security with, generally, a minimum impact on functionality.
Dig Deeper on Web application and API security best practices
Related Q&A from Nick Lewis
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading
Enterprises new to the cloud can write new security policies from scratch, but others with broad cloud usage may need an update. Consider these ... Continue Reading