Poisoned JavaScript code tops malware list

Discussion in 'malware problems & news' started by CloneRanger, Jul 4, 2010.

Thread Status:
Not open for further replies.
  1. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
  2. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    That's why NoScript exists. It's default whitelist mode is a great layer of security and privacy.
     
  3. xorrior

    xorrior Registered Member

    Joined:
    Mar 22, 2010
    Posts:
    66
    It was a spammer that spread through social engineering. No buffer overflows, XSS, XSRF etc..

    I'd rather keep jscript and just use common sense. Malware has been spreading like this going on 3 decades..
     
  4. vasa1

    vasa1 Registered Member

    Joined:
    May 1, 2010
    Posts:
    4,417
    At least based on the first link provided, it would need someone quite new to the ways of the internet to fall for the exploit.

    Such a person would not be competent to handle NoScript.
     
  5. Cudni

    Cudni Global Moderator

    Joined:
    May 24, 2009
    Posts:
    6,963
    Location:
    Somethingshire
    only has to be competent/aware enough to run NoScript to start with. From that point on it takes over and protects
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.