Desktop-as-a-Service Designed for Any Cloud ? Nutanix Frame
The vulnerability in IE takes place when the "attack" looks like it comes from a trusted source, then, obviously leading the target to fall into the trap of then clicking on a link or file.
After the malware is downloaded and installed, a back door opens, which allows the attacker top gain complete control of the system
McAfee certain that a vulnerability in Microsofts Internet Explorer was an important pathway for the attacks on Google.