Malvertising

Glossary

No clicking on suspicious links, no downloading dubious email attachments: There are cyber attacks that allow criminals to invade your systems without your noticing them. These malicious programs are often found in infected ads that camouflage themselves as advertisements. When visiting affected websites, these ads will run automatically. They use vulnerabilities in the browser, whereby the malicious programs are automatically downloaded (drive-by attack). Trustworthy sites can also be affected if they include advertising from unknown third parties in their own internet presence, without quality control.

Our tip: Always use the latest version of your browser and automatically download security updates. You can also use an ad blocker: it will block ads before they open in your browser. Note, however, that many free services, such as online media, are financed through advertising. With an active ad blocker, these are often not or only partially available.

Related articles

  • Incognito Mode

    The browser incognito mode (also called private mode) does not create a history of your website visits. However, in incognito mode, most of your bookmarks and saved passwords are accessible.

    mehr lesen
  • Exploit

    The term, “exploit,” refers, in the IT world, to programs that identify vulnerabilities. Most cyber criminals use exploit programs that exploit the vulnerabilities found. Therefore, add exploits to malicious software (malware).

    mehr lesen

Are you curious?

Test us for 30 days free of charge and without obligation.

We empower your employees to actively contribute to your company’s cybersecurity.

See for yourself how easily and quickly Perseus can be integrated into your corporate structure.

Test now for free

Do you have any questions about our services?

Do not hesitate to call: + 49 30 95 999 8080

  • Free trial period
  • Without obligation
  • Video training for cyber security and data protection with exam and certificate
  • Try our phishing simulation
  • IT security check, malware scanner, data security check and more
  • Ends automatically after 30 days