Microsoft Flaw Was a Factor in Aurora attacks

The vulnerability in IE takes place when the "attack" looks like it comes from a trusted source, then, obviously leading the target to fall into the trap of then clicking on a link or file.

After the malware is downloaded and installed, a back door opens, which allows the attacker top gain complete control of the system

Microsoft said it was investigating the report issued by McAfee, but determined that IE 6, 7 and 8, did contain the security vulnerability.

McAfee certain that a vulnerability in Microsoft’s Internet Explorer was an important pathway for the attacks on Google.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • More than ever, agile Software Life Cycle Development and DevOps drives critical top-line business impact for customers across a broad range of industries. Learn how XtremIO is fundamentally enabling the next generation of agile Software Development & DevOps to: Radically improve developer efficiency and overall product quality via an All-Flash Dev Ops platform Enable modern lightning fast dev methodologies with zero-cost application & datasets full copies. Allow Developers to have zero storage obstacles, …

  • Microsoft® Office 365 is a top choice for enterprises that want a cloud-based suite of productivity/ collaboration applications. With Office 365, you get access to Microsoft™ Office solutions practically anytime, anywhere, on virtually any device. It's a great option for current Microsoft users who can now build on their experience with Microsoft™ solutions while enjoying the flexibility of a cloud-based delivery. But even organizations with no previous investment in Microsoft will find that …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date