@woodcutter Why would you think World Of Tanks would help with security?
Just kidding. By WOT do you mean Web of Trust? That seems like an interesting tool, though I don’t use it. Anonymous crowdsourcing is not a good way to construct a Web of Trust (that’s a different link) because you can’t trust anonymous strangers pretty much by definition. I haven’t read up on the program enough to know how it actually works, but the website indicates that it tracks the users to accomplish this. That’s not good, and it’s not enough. The program does not seem to be open source, so you have to trust the developers that it does what they say it does.
Also, it seems like the WOT program tracks all this activity in a single centralized database. That’s a problem since it’s a single point of failure and potentially vulnerable to MITM – an attacker could poison site ratings that way. Not only that, but how do we know we can trust the maintainers of that database? We thought we could trust the HTTPS certificate authorities – look how that turned out.
Basically, trust-based security is a Good Thing, but trust has to be handled properly. You don’t sign a key unless you know that person AND you have verified their picture ID or some other official ID method. The system has to properly handle trust transitivity (Alice trusts Bob, Bob trusts Carol, so Alice trusts Carol a little) and it needs to be Free and open. Ideally it should be perfectly transparent and every user should have perfect knowledge of the system, but that’s an impossible ideal- so we do the best we can with PGP and the like.
Okay, rant over. Folks, HTTPS is fundamentally broken, but right now it’s what we have, and I still recommend the HTTPS-Everywhere plugin to anyone using a browser (and if your browser doesn’t support it, you should consider switching to one that does.) In a few years we’ll have better tools deployed- most ISPs won’t deploy IPv6 without IPSEC if they do it at all, and DNSSEC should finally remove the cache-poisoning problem once and for all (in addition to possibly replacing HTTPS, assuming you can trust in-addr.arpa).
Finally, to answer your question, malware attacks on PCs are often done in a “shotgun”-style approach. The black hats don’t know or care what’s on your computer, usually they just want to take over one that has network access. That’s because they have in mind attacking a big site like a bank or other company. With a botnet they can overwhelm a company’s Web servers and make their web pages error out so no one can use them. To make a botnet they need as many computers as possible, so they spread malware everywhere they can.
Finally, you said you hadn’t been to any suspicious sites. This assumes that you can know which sites are suspicious (WOT, right?) which would not necessarily be the case even if WOT worked perfectly all the time:
It’s possible for an attacker to take over another site’s url with a technique called cache poisoning – this means you could point your browser to google.com and get a fake site run by someone else. If they did it skillfully enough, you’d never know it wasn’t Google. (This probably wouldn’t work with Google- but the attack on DigiNotar did!). There’s nothing much you as a user can do about this unless you know more about DNS than most.
Also, some sites use something called cross-site scripting or XSS which can silently redirect you to another site or cause your browser to download data from that site. In many cases XSS in innocuous- for example, many OpenID client sites use it to authenticate you against your OpenID provider- but it has many many nefarious uses. It’s also possible for an otherwise reputable site to have these scripts “injected” into their content against their will.
To defend against this I recommend the NoScript plugin. It is pretty flexible, but it blocks pretty much all scripts by default (which means embedded videos won’t work, and Fluther would look totally broken). You have the option of allowing scripts from some sources but not others (for example, if you were on fluther you could choose to allow from fluther.com and quantserve.com but deny from yahooapis.com). It’s good. Everyone should use it.
Well, I see I’ve written a bit of a book here. Hopefully no one will fall asleep halfway through. If it’s boring, I apologize- but I haven’t had my coffee yet!