New
#631
To get a file on your computer without user interaction (ie downloading and running the file yourself), the malware creators must make use of an exploit in a certain piece of software to drop and execute the file on your computer - and probably get privilege escalation so it can really do some damage. Exploits can either be found or purchased (I read somewhere that Java exploit can be sold for around $10,000), but in most scenarios, they are abused before the software developers, Adobe for example, have a chance to patch them; hence, unpatched exploits :)