The alert window also had a makeover with additional details whenever an exploit is blocked:Īnti-Exploit protection is about being proactive and not giving the bad guys a single chance to compromise your system. Here are some highlights from this latest release:Īdvanced settings, for more granular control: On top of the usual bug fixes, this version brings out support for more applications, new protection techniques and a brand new alert window, just to name a few. Today, we are proud to announce that a new version of Malwarebytes Anti-Exploit is now available for download. More specifically, our Anti-Exploit product is designed to stop web-borne or file-borne exploits before they unleash their malicious payload. We documented such cases on this blog and described how popular websites were redirecting their visitors to exploit kits.įortunately, we, the good guys, are fighting malware and exploits every day to keep you safe. This happened on three occasions in January with three Adobe Flash Player zero-days.Ī zero-day exploit means that there is no patch available from the vendor that could protect you. That is why it is crucial to keep your computer up-to-date and also get rid of programs you rarely use to reduce the potential attack surface.īut even so, there are times when even the most patched machines are still vulnerable. There is no such thing as a “safe” site anymore This phenomenon takes advantage of software vulnerabilities that exist in browsers (Internet Explorer, Firefox, etc.) as well as their plugins (Flash Player, Silverlight, Java, Reader, etc.). In fact, all websites are a potential source of infection either because they can get compromised or because they host a malicious advertisement. The scenario is quite simple: you browse to a website and malicious code is downloaded to your computer automatically without your knowledge or approval.Ĭontrary to some beliefs, you do not need to browse to shady websites for this to happen. Did you know that the majority of new malware is delivered via the web through a process known as a drive-by download attack?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |