Drive-by Downloads: What They Are and How to Defend Against Them
Stopping the Drive-By Threat
Everything is Not What it Seems
What You Don’t Know Can Hurt You
The Best Defense
Use Common Sense
Second, it’s a good idea to turn on your phishing filter, as shown above. Doing so might help you to spot misbehaving Internet sites. If in doubt, have Microsoft check the dubious Web site. You can do this by selecting Tools>Phishing Filter>Check This Website.
But hey, Internet Explorer doesn’t keep any secrets from you. The browser will pop a window (as shown above) notifying you of the blocked pop-up. To display the pop-up or download the file, you need only right-click on the Information Bar and choose Temporarily Allow Pop-Ups.
Manage Your Add-ons
In this window, you may scroll through all the add-ons that Internet Explorer uses. Furthermore, you can use the drop-down menu at the top of the window, to browse the add-ons by four categories: Add-ons that have been used by Internet Explorer, Add-ons currently loaded in Internet Explorer, Add-ons that load when Internet Explorer Starts, and Downloaded Active X Controls. There are two types of add-ons that should raise a red flag: those that you don’t recognize and those that are not verified. Unrecognized add-ons that are verified by Microsoft are fine, but those that are not verified should be investigated or disabled from within the add-on manager.