{"id":350791,"date":"2010-02-22T19:32:17","date_gmt":"2010-02-23T00:32:17","guid":{"rendered":"http:\/\/davidkirkpatrick.wordpress.com\/?p=6818"},"modified":"2010-02-22T19:32:17","modified_gmt":"2010-02-23T00:32:17","slug":"a-tool-to-stop-%e2%80%9cdrive-by-downloads%e2%80%9d","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/350791","title":{"rendered":"A tool to stop \u201cdrive-by downloads\u201d"},"content":{"rendered":"<p>If this thing works, <a href=\"http:\/\/www.technologyreview.com\/computing\/24632\/?nlid=2762&amp;a=f\" >everyone ought to use to it.<\/a><\/p>\n<p>From the link:<\/p>\n<blockquote>\n<p>Researchers at\u00a0<a href=\"http:\/\/www.sri.com\/\" >SRI International<\/a> and Georgia Tech are preparing to release a free tool to stop &#8220;drive-by&#8221; downloads: Internet attacks in which the mere act of visiting a Web site results in the surreptitious installation of malicious software. The new tool, called BLADE (Block All Drive-By Download Exploits), stops downloads that are initiated without the user&#8217;s consent.<\/p>\n<p>&#8220;When your browser is presented with an [executable file] for download, it&#8217;s supposed to prompt you for what to do,&#8221; said Phil Porras, SRI&#8217;s program director. But software can also be pushed onto an unsuspecting user&#8217;s computer without ever asking for permission.<\/p>\n<p>In the fourth quarter of 2009, roughly 5.5 million Web pages contained software designed to foist unwanted installs on visitors, according to\u00a0<a href=\"http:\/\/www.dasient.com\/\" >Dasient<\/a>, a firm that helps protect websites from Web-based malware attacks. Such drive-by downloads target computers that are not up-to-date with the latest security patches for common Web browser vulnerabiltiies, or are missing security updates for key browser plug-ins, such as Adobe&#8217;s PDF Reader and Flash Player. Attackers use software called exploit packs, which probe the visitor&#8217;s browser for known security holes.<\/p>\n<\/blockquote>\n<p>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/davidkirkpatrick.wordpress.com\/6818\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/davidkirkpatrick.wordpress.com\/6818\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/godelicious\/davidkirkpatrick.wordpress.com\/6818\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/delicious\/davidkirkpatrick.wordpress.com\/6818\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gostumble\/davidkirkpatrick.wordpress.com\/6818\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/stumble\/davidkirkpatrick.wordpress.com\/6818\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/godigg\/davidkirkpatrick.wordpress.com\/6818\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/digg\/davidkirkpatrick.wordpress.com\/6818\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/goreddit\/davidkirkpatrick.wordpress.com\/6818\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/reddit\/davidkirkpatrick.wordpress.com\/6818\/\" \/><\/a> <img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/stats.wordpress.com\/b.gif?host=davidkirkpatrick.wordpress.com&#038;blog=2464417&#038;post=6818&#038;subd=davidkirkpatrick&#038;ref=&#038;feed=1\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If this thing works, everyone ought to use to it. From the link: Researchers at\u00a0SRI International and Georgia Tech are preparing to release a free tool to stop &#8220;drive-by&#8221; downloads: Internet attacks in which the mere act of visiting a Web site results in the surreptitious installation of malicious software. The new tool, called BLADE [&hellip;]<\/p>\n","protected":false},"author":4050,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,10],"tags":[],"class_list":["post-350791","post","type-post","status-publish","format-standard","hentry","category-news","category-software"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/350791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/4050"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=350791"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/350791\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=350791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=350791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=350791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}