Recommended Posts

Yes, easily, unless your using the newest version of the popular browsers, IE 8, Firefox,Opera, those are my recommendations, (not so much for IE8 though..)

Spyware/anything can easily slip through cracks in older versions of IE, an issue that took microsoft a long time to adress, you simply go to a web address, and tomorrow your computer doesn't work, amazing how these things work right? :p

quite sad frankly.

Welcome to neowin.

using any browser older than firefox2/IE8 isn't recommended in my books.

chris, that is untrue, old versions of ie without updated to latest updates XP, can get easily infected without any input and installed, utilizing rundll32 and more libary's bugs and easy exploits, its extremely easy, any hack(term for a dumbass, not hacker :p) can do it with 3 google searches.

Edited by Matan Mates

There have been brief periods where serious exploits exist in IE / Windows that allow malware to be installed just be accessing a page, but for the most part getting the computer to install something without user input is pretty much impossible; only passive exploits like tracking cookies etc...

Chris

Thanks for your kind replies - im beginning to like Neowin!

I usually use FF3, although i am currently using Google Chrome.

I'm doing research for my ICT project, and ive always thought it was impossible to install malware etc without users permission, only by social engineering or ID10T errors :p

As already stated, there have been many proven exploits of drive by infections.. If you browser is open to these exploits, or your security settings are not correct then sure its quite possible to get yourself infected just by an AD that is placed on an unaware web site hosting ads with services that do not verify the code their customers are placing, etc.

Do some research on your own.. Here is one example of an article on it.

http://jamesmirick.wordpress.com/2007/12/2...-by-infections/

They have a link to the white paper "ghost in the browser" Good Read!

http://www.usenix.org/events/hotbots07/tec...ovos/provos.pdf

But yes quite often people let themselves be infected.. The latest false antivirus 2008, 2009 craze is a prime examples of this.. A site pops up something stating your infected -- click here, etc.. Next thing they are wanting $39.95 to clear out their "own" crap from your machine.. There was just a thread about this a couple of days ago.

You also run into the issue when the user infects themselve with 1 piece of malware, quite often it will lower the security settings on the browser - to make it easier to keep itself installed.. allow for partner crapware to be installed, etc.

They make lots of money with this crap.. So yes they are getting very very sneaky and finding new tricks to install their crapware on your box.

I recently got infected with a rootkit just by going to a website, while using the latest version of firefox. It hijacked all my browsers, when I search anything on any popular serach engine, it gave fake results that redirects to crap sites. I think I could have prevented it using NoScript. Btw NOD32, Avast, and AVG did not detected it, the only thing that got rid of it was Malwarebytes.

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • It funny how in a few short years Intel has become the budget brand. I just had to do an unexpected platform swap on my main system due to memory stability issues that suddenly developed. I went with a 9800X3D, but seeing these prices making me regret not at least considering this direction. I really don't need top-tier performance, and between a cheaper CPU and cheaper board, the Intel option looks like it would have been $300-400 cheaper. I already have a 360 AIO, so the extra heat wouldn't have been a big deal. Oh well, live and learn. I normally am the kind of person that will consider something like this for weeks, but I needed to move quickly and my decision point was "9800X3D is a fantastic chip, and Ultra-200 is basically a joke" which is true, but what I didn't consider is a CPU like this 265K is still worlds head of my 5800X, and I really don't need more than that. Its just the enthusiast mindset :-)
    • The only compelling reason for 99% of people will be Windows 10's end-of-support on October, nothing more.
    • This thread has run its course. The complaint has been noted and we'll handle things on our side.  Again, for future reference please report a post that you have an issue with and we will investigate.  <Thread closed>
    • AMD Ryzen 9000, 8000, 7000 CPUs have a vulnerable TPM-Pluton, major firmware fix released by Sayan Sen Last week, the Trusted Computing Group (TCG), which is the developer of the Trusted Platform Module (TPM) security standard, alerted the press and AMD about a new TPM vulnerability on Ryzen processors. Tracked under ID "CVE-2025-2884" (AMD is tracking it as "AMD-SB-4011"), the vulnerability allows an attacker to exploit the vulnerability by sending malicious commands to read data stored in the TPM via an information disclosure flaw or potentially impact TPM availability on systems through a denial of service attack. This is a type of out-of-bound read security flaw. The TCG notes that the flaw occurs in the CryptHmacSign function due to improper validation of a message digest or hash via the hash-based message authentication code (HMAC) signature scheme, leading to an out-of-bounds situation. TCG explains in its VRT0009 advisory: The Common Vulnerability Scoring System (CVSS) score of the flaw is 6.6 indicating a medium level of severity. This is typically the case for most local-level attacks as in order to exploit such a flaw, the threat actor must have physical access to a device. Regardless, AMD has issued firmware to patch the vulnerability on Ryzen 7000, 8000 (Zen 4) and Ryzen 9000 (Zen 5) parts. AMD has confirmed that AGESA (AMD Generic Encapsulated Software Architecture) firmware Combo PI (Platform Initialization) 1.2.0.3e mitigates the flaw. The company notes that the said firmware fixes "ASP fTPM + Pluton TPM" issue. If you are wondering, ASP refers to AMD Secure Processor which is "a dedicated hardware component embedded in every system-on-a-chip." AMD's motherboard vendor partners like Asus and MSI have already begun rolling out the firmware update. MSI has a blog post about the 1.2.0.3e Combo PI as it mentions several new upcoming features including support for new CPUs, better memory compatibility, and more. MSI writes: Interestingly, Asus notes that this firmware update is irreversible as it is a major release. Thus one would hope that it is a very stable release and given that this is the "e" stepping of the firmware, there are pretty good chances of that. Other vendors like Gigabyte and ASRock are yet to release their updates.
    • Really?? Having a sense of humor is a sign of intelligence...what does that say about someone who totally misses the joke and can only respond by parroting a political talking point they heard others make?
  • Recent Achievements

    • Apprentice
      Wireless wookie went up a rank
      Apprentice
    • Week One Done
      bukro earned a badge
      Week One Done
    • One Year In
      Wulle earned a badge
      One Year In
    • One Month Later
      Wulle earned a badge
      One Month Later
    • One Month Later
      Simmo3D earned a badge
      One Month Later
  • Popular Contributors

    1. 1
      +primortal
      604
    2. 2
      ATLien_0
      281
    3. 3
      +FloatingFatMan
      179
    4. 4
      Michael Scrip
      151
    5. 5
      Steven P.
      111
  • Tell a friend

    Love Neowin? Tell a friend!