if a site is serving up syndicated ads, i.e. if the site owner is letting a 3rd party choose & display the ads & does not know exactly what ad will be served at a specific time to a specific user, then yes there is a risk of rogue malware infested ads being delivered.
[ e.g. There's an on-going debate at virginmedia.com community forum about virginmedia.com ad-infested home pages servicing up rogue update flash ads & thus malware, to VM customers ( who have to visit that page when accessing webmail)
VM are a reputable company, most would agree, but seem to have no knowledge or control over what gets served up on their home page, according to the critics. ]
if google ad servers are involved then what they serve is related to whether google knows who is browsing and what it knows about that person, so the OP could be served ads that you & I are not served, all without Kovid or whoever runs the calibre download site begin any the wiser
I am not quite curious/rash enough to go visit the calibre download page with all my adblockers and AV disabled, but if someone is, perhaps they can "view source" & report back.
in the case we have here, we need to know what URL the OP is using, to check if that's the same one the rest of use use. then view source on that page will reveal exactly what goes on under the bonnet.
As for "set a security setting in chrome" - installing the adblock extension does block much of the malware infestations within ads, by blocking the ads. without such an extension it is very likely that chrome will happily display a rogue you need to update flash advert which leads to the installation of all sorts of crap for anyone who clicks OK.
|