mchain
2
Hi xtranaut,
Welcome to the forums.
Well, as the link you provide is dated February 5th, 2016, it would be old news, it would seem. However, having said that, it would also explain why you’ve not seen current news regarding these exploits.
Key trigger in exploit(s) is shortening the URL link posted. One workaround is to hover your mouse over any url link and look down to the lower left corner to see if links match. If they don’t, either the full version of a shortened url is visible or it is a malicious redirect of a site. More information about url shortening here: https://duckduckgo.com/?q=URL+shortening&atb=v23&ia=web
Because of the possible malicious nature of any shortened url, I never use such.
I’d start with the Wikipedia article and go from there.
Avast has already fixed the holes: (Scroll down to view quote in your linked article.)
Ormandy told Avast about their problem on December 18, and ten days later, the company issued a quick fix that prevented this issue from being exploited. The latest version of the Avast antivirus released on February 3 included a complete fix for this problem.
So, if you are careful not to click shortened urls one of the ways to exploit your system is minimized.
Two recommendations:
- Purchase and learn how to use disk imaging software
- Practice safe browsing and use software gotten only from reputable vendors
Sorry you had to go through what you’ve been through.