Microsoft Flaw Was a Factor in Aurora attacks

WEBINAR: On-demand webcast

How to Boost Database Development Productivity on Linux, Docker, and Kubernetes with Microsoft SQL Server 2017 REGISTER >

The vulnerability in IE takes place when the "attack" looks like it comes from a trusted source, then, obviously leading the target to fall into the trap of then clicking on a link or file.

After the malware is downloaded and installed, a back door opens, which allows the attacker top gain complete control of the system

Microsoft said it was investigating the report issued by McAfee, but determined that IE 6, 7 and 8, did contain the security vulnerability.

McAfee certain that a vulnerability in Microsoft’s Internet Explorer was an important pathway for the attacks on Google.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Making Digital transformation real is a tough challenge for most businesses. A successful strategy is to start with a data platform that simplifies data collection, consolidation, protection and preservation which further drives insights, and services at scale. Laura Dubois, Group Vice President of Storage, Servers, and Infrastructure at IDC joins us to discuss why organizations should be prioritizing the data platform as they embark on their digital transformation journey. In this webinar you will learn …

  • Learn which Mobile Development Platforms scored the highest in the current Forrester Wave. This report details the research findings about how well vendors fulfilled the 32 criteria to help you select the right partner for your mobile development platform needs. Download a free copy of the report compliments of Kinvey, a Progress company.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date