Additional Defenses against Malicious Mobile Code

While examining the risks associated with malicious mobile code, we've also looked at the applicable approaches to mitigating them. Before we look at some additional defensive measures, here's a high-level overview of the most critical protective mechanisms that we have covered so far:

  • Surf the Internet and read email from a non-superuser account (i.e., not a root or administrator).

  • Stay aware of vulnerability and patch announcements for browser and e-mail software that you use.

  • Apply relevant patches or workarounds in a timely manner.

  • Be mindful while visiting rogue Web sites that might attempt embedding XSS exploits in hyperlinks.

  • Be mindful of clicking URLs in e-mail messages that might attempt ...

Get Malware: Fighting Malicious Code now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.