Use verification of distributed binaries through hash checking or other integrity checking mechanisms. Scan downloads for malicious signatures.