Drive-By Downloads: How They Attack and How to Defend Yourself