You can be infected by visiting a rogue website (Internet Explorer pop-ups). Makers of Trojans and other pests most often target Internet Explorer, because it contains numerous bugs, some of which improperly handle data (such as HTML or images) by executing it as a legitimate program. Attackers who find such vulnerabilities can then specially create a bit of malformed data so that it contains a valid program to do their bidding. The more features a web browser has (for example ActiveX objects and some older versions of Flash or Java), the higher your risk of having security holes that can be exploited by a Trojan horse.
last modified: 2009-04-27 18:01:17