Print

Previous

Next

What are Drive-by Downloads and Botnets?

A couple more growing, important threats ZoneAlarm browser security is designed to prevent are drive-by downloads and botnets. The virtualization engine* helps shields you from these threats.

Drive-by downloads include any Web-based download to your computer that occurs without your knowledge. This could be spyware, viruses, or other troublesome programs designed to automatically install themselves and steal from you or harm your computer. Even well-known Web sites have been mugged by drive-by download criminals. Drive-by downloads get through to your computer by exploiting security holes in Web browsers or operating systems.They can also happen when you click somewhere in the mistaken belief that it is a harmless message or other type of Web link. Essentially, you can be tricked into initiating the download. The ZoneAlarm browser security virtualization technology* and spyware scanning system work to protect you from these unwelcome downloads. With the virtualization net, ZoneAlarm browser security catches and deletes drive-bys so they never make it to your real PC.

Botnets are used for a variety of purposes, including theft of software serial numbers, login identities, and financial information such as credit card numbers, as well as intentional network performance inhibition (such as denial-of-service attacks) and spam. Botnets are collections of software robots (known as "bots") silently running on invaded computers owned by unsuspecting computer users. The bots can be instructed remotely by the botnet originator, though the bots are designed to act autonomously and propagate themselves using security vulnerabilities that they uncover. Email spammers can purchase access to botnets and send out spam messages via the invaded computers. Because one of the ways that botnets propagate themselves is through drive-by downloads, ZoneAlarm browser security is again important for insulating you from this type of invasion.

In This Section

Protection from Zero Day Threats*

Understanding Phishing, Spy Sites, and Spyware

See Also

Understanding Phishing, Drive-bys, and Other Threats

 
©2011 Check Point Software Technologies Ltd. All rights reserved.