WEBINAR: On-demand webcast
How to Boost Database Development Productivity on Linux, Docker, and Kubernetes with Microsoft SQL Server 2017 REGISTER >
The vulnerability in IE takes place when the "attack" looks like it comes from a trusted source, then, obviously leading the target to fall into the trap of then clicking on a link or file.
After the malware is downloaded and installed, a back door opens, which allows the attacker top gain complete control of the system
McAfee certain that a vulnerability in Microsofts Internet Explorer was an important pathway for the attacks on Google.