How are hackers able to hack a target without installing malware? [duplicate]

How do hackers place a RAT or Trojan on the target’s computer without downloading the files to the target computer, just by clicking on a link? Or can they take over the target’s computer by opening a file in the browser without downloadin… Continue reading How are hackers able to hack a target without installing malware? [duplicate]

How to create a download link without automatically prompting the file with a link? [closed]

There is an image file. How do I convert it to a download link or embed it in a download link? How do I get the image file to download automatically silently, without asking, as soon as a link is clicked?

Continue reading How to create a download link without automatically prompting the file with a link? [closed]

How to create a download link without automatically prompting the file with a link? [closed]

There is an image file. How do I convert it to a download link or embed it in a download link? How do I get the image file to download automatically silently, without asking, as soon as a link is clicked?

Continue reading How to create a download link without automatically prompting the file with a link? [closed]

Are drive-by downloads and installs a significant threat to an average modern Android or Firefox for Windows user?

Today I learned that drive-by downloads and drive-by installations are or have been a thing. Yet there’s something very counterintuitive about them if considered a real threat for modern smartphone or modern mainstream web browser users. F… Continue reading Are drive-by downloads and installs a significant threat to an average modern Android or Firefox for Windows user?

Realistically, how likely it is to have a computer compromised from browsing random websites?

Another question inspired by a recent discussion in the ‘The DMZ’ chatroom.
Long story short: IT guys are worried that accountants’ workstations may become compromised because accountants watch cat meme websites. Proposed solution: Lock do… Continue reading Realistically, how likely it is to have a computer compromised from browsing random websites?

Realistically, how likely it is to have a computer compromised from browsing random websites?

Another question inspired by a recent discussion in the ‘The DMZ’ chatroom.
Long story short: IT guys are worried that accountants’ workstations may become compromised because accountants watch cat meme websites. Proposed solution: Lock do… Continue reading Realistically, how likely it is to have a computer compromised from browsing random websites?

Can a link hack my phone even if it didn’t do any drive-by download or tried into tricking me to install a malicious software? [closed]

I opened a link that was said to be malicious and hacks you instantly once opened.
It was an "Amazon 30th anniversary" scam I received it from a friend (who approved he was the one who sent it and not a hacker)
However the webpag… Continue reading Can a link hack my phone even if it didn’t do any drive-by download or tried into tricking me to install a malicious software? [closed]

WordPress Redirect Hack via Test0.com/Default7.com

Malicious redirect is a type of hack where website visitors are automatically redirected to some third-party website: usually it’s some malicious resource, scam site or a commercial site that buys traffic from cyber criminals (e.g. counterfeit drugs o… Continue reading WordPress Redirect Hack via Test0.com/Default7.com