Microsoft Flaw Was a Factor in Aurora attacks

The vulnerability in IE takes place when the "attack" looks like it comes from a trusted source, then, obviously leading the target to fall into the trap of then clicking on a link or file.

After the malware is downloaded and installed, a back door opens, which allows the attacker top gain complete control of the system

Microsoft said it was investigating the report issued by McAfee, but determined that IE 6, 7 and 8, did contain the security vulnerability.

McAfee certain that a vulnerability in Microsoft’s Internet Explorer was an important pathway for the attacks on Google.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Organizations are increasingly gravitating toward mobile-first application development as they assess the need to revamp their application portfolios to support touch computing and mobility. Consumerization has brought higher expectations for application usability along with the mobile devices themselves. Enterprises are increasingly shifting their new application acquisitions and development efforts toward mobile platforms. With this backdrop, it is natural to expect application platform vendors to invest in …

  • The mobile revolution and the need for mobile apps have created an unprecedented set of challenges for IT organizations. This eBook discuss these challenges and how organizations can address them by making their mobile app development processes more efficient and more effective.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date