Browse Definitions :
Definition

pop-up download (or download pop-up)

A pop-up download (sometimes called a download pop-up ) is a pop-up window that asks the user to download a program to their computer's hard drive. The window may feature a security warning, or some other type of message that is likely to lead to compliance. Often, the pop-up window has no information about the program to be downloaded, and may feature buttons for "download," "yes," or "ok" -- but none for "no" or "cancel." Faced with a pop-up download window, the user may think that the download in question is just a browser plug-in application needed for aspects of a Web site they're visiting, or that the pop-up window was generated by their own computer.

Pop-up downloads often install programs that track online behavior and report it back to a parent company ( spyware ) and programs that use that information to generate specific pop-up advertisements ( adware ). EarthLink, a popular Internet service provider ( ISP ) recently estimated that 40 to 50 percent of their subscribers have such applications running on their computers, usually without the owner's knowledge. Subscribers contacting the ISP to report a problem are often surprised to find that these downloads are the cause.

A less scrupulous variation of automatic installation, called a drive-by download , installs a program on a computer's hard drive without even first generating a pop-up window.

This was last updated in March 2011
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close