Microsoft Flaw Was a Factor in Aurora attacks

The vulnerability in IE takes place when the "attack" looks like it comes from a trusted source, then, obviously leading the target to fall into the trap of then clicking on a link or file.

After the malware is downloaded and installed, a back door opens, which allows the attacker top gain complete control of the system

Microsoft said it was investigating the report issued by McAfee, but determined that IE 6, 7 and 8, did contain the security vulnerability.

McAfee certain that a vulnerability in Microsoft’s Internet Explorer was an important pathway for the attacks on Google.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Download this IDC report to learn how your organization can benefit from new flash architecture built for the cloud era. The IDC report examines the evolving primary flash array market with a particular emphasis on how next generation flash–driven enterprise storage architectures will take performance, scalability and infrastructure density to the next level.

  • Thanks to the pervasive use of virtualization, hybrid cloud, and software–defined architectures — enterprise IT infrastructures are impossibly complex. Performance monitoring solutions are critical for enabling IT teams to identify key bottlenecks and emergent issues, for understanding which workloads are more demanding in terms of resource contention, and for cost effective capacity and resource planning. Read this IDC Customer Spotlight for a glimpse into real–world implementations and use …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date