No clicking on suspicious links, no downloading dubious email attachments: There are cyber attacks that allow criminals to invade your systems without your noticing them. These malicious programs are often found in infected ads that camouflage themselves as advertisements. When visiting affected websites, these ads will run automatically. They use vulnerabilities in the browser, whereby the malicious programs are automatically downloaded (drive-by attack). Trustworthy sites can also be affected if they include advertising from unknown third parties in their own internet presence, without quality control.
Our tip: Always use the latest version of your browser and automatically download security updates. You can also use an ad blocker: it will block ads before they open in your browser. Note, however, that many free services, such as online media, are financed through advertising. With an active ad blocker, these are often not or only partially available.
The browser incognito mode (also called private mode) does not create a history of your website visits. However, in incognito mode, most of your bookmarks and saved passwords are accessible.mehr lesen
The term, “exploit,” refers, in the IT world, to programs that identify vulnerabilities. Most cyber criminals use exploit programs that exploit the vulnerabilities found. Therefore, add exploits to malicious software (malware).mehr lesen