Google not using Chrome, but IE instead

WEBINAR: On-demand webcast

How to Boost Database Development Productivity on Linux, Docker, and Kubernetes with Microsoft SQL Server 2017 REGISTER >

Thursday, 14 January, 2010, Mike Reavey, director of Microsoft's Security Response Center acknowledged that an IE exploit had been used in the attacks against Google and other major corporations.

Why Google workers were using IE, especially IE 6, remains a mystery, but it is actually the norm within technology companies for employees to run multiple browsers.

The fact remains: many customers are still using IE 6, despite all efforts to encourage customers to upgrade; and, as long as this fact remains true, who knows what further exploits in IE 6 may be discovered.

Google's corporate network was hacked because its workers were not running their own browser, but Microsoft's Internet Explorer

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Microsoft Azure® is a leading choice for businesses looking to take advantage of the cloud. Azure is particularly appealing to businesses that have already invested in Microsoft on-premises and are now considering running these applications and other workloads in the cloud. To understand how to make this move to Azure, many businesses are turning to managed service providers (MSPs) with specific Azure expertise. Read this white paper to learn the eight key areas to focus on when considering an MSP for an …

  • Whether a mandate to secure all web and mobile apps comes from a newly enlightened CIO or in response to a major security breach, beginning even a small application security program can be a daunting task. How will you know how many digital assets you have, let alone their risk profile? In this webinar we explore how, using a cloud solution like Fortify on Demand, even the largest organizations can begin to scan apps immediately and rapidly scale an application security program. Identify and risk rank assets, …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date