Microsoft Flaw Was a Factor in Aurora attacks

The vulnerability in IE takes place when the "attack" looks like it comes from a trusted source, then, obviously leading the target to fall into the trap of then clicking on a link or file.

After the malware is downloaded and installed, a back door opens, which allows the attacker top gain complete control of the system

Microsoft said it was investigating the report issued by McAfee, but determined that IE 6, 7 and 8, did contain the security vulnerability.

McAfee certain that a vulnerability in Microsoft’s Internet Explorer was an important pathway for the attacks on Google.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: November 20, 2014 @ 2:00 p.m. ET / 11:00 a.m. PT Are you wanting to target two or more platforms such as iOS, Android, and/or Windows? You are not alone. 90% of enterprises today are targeting two or more platforms. Attend this eSeminar to discover how mobile app developers can rely on one IDE to create applications across platforms and approaches (web, native, and/or hybrid), saving time, money, and effort and introducing apps to market faster. You'll learn the trade-offs for gaining long …

  • IBM Worklight is a mobile application development platform that lets you extend your business to mobile devices. It is designed to provide an open, comprehensive platform to build, run and manage HTML5, hybrid and native mobile apps.

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds