Mac malware that steals passwords, cryptocurrency wallets, and other sensitive data has been spotted circulating through Google ads, making it at least the second time in as many months the widely used ad platform has been abused to infect web surfers.
Like most other large advertising networks, Google Ads regularly serves malicious content that isn’t taken down until third parties have notified the company. Google Ads takes no responsibility for any damage that may result from these oversights. The company said in an email it removes malicious ads once it learns of them and suspends the advertiser and has done so in this case.
People who want to install software advertised online should seek out the official download site rather than relying on the site linked in the ad. They should also be wary of any instructions that direct Mac users to install apps through the right-click method mentioned earlier. The Malwarebytes post provides indicators of compromise people can use to determine if they’ve been targeted.
Larger sites cater towards scriptless web for accessibility requirements.
Smaller sites don’t need SPA, so will most likely work to some degree.
The better (not necessarily bigger) blog systems will use scripting for fancy things, but will have fallbacks and will still work.
It’s the middle tier web-app (and sites that want to be a web app but have no reason to be) that will run SPA without any fallback. You know, the ones that want to send notifications and know your location and all that fun stuff.
The person you’re explaining websites to is a web developer and they are correct. There being a ton of websites needlessly dependent on JavaScript is well known and long lived.