What is a Drive by Download Attack?
Typically, a small snippet of code is downloaded to the user’s system and that code then reaches out to another computer to get the rest and download the program. It often exploits vulnerabilities in the user’s operating system or in different programs, such as Java and Adobe.
The best way is to be sure all of your operating systems and software programs are up to date. This lowers your risk of vulnerability. Additionally, try to minimise the number of browser add-ons you use as these can be easily compromised. For example, if your computers don’t need Flash or the Java plug-in, consider uninstalling them.
Cyber attacks are being performed every second of every day.
You must review your current Cyber defences and continue to have them tested by professional organisations.
View the CYBER ATTACK video