Microsoft Flaw Was a Factor in Aurora attacks

CodeGuru content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

The vulnerability in IE takes place when the “attack” looks like it comes from a trusted source, then, obviously leading the target to fall into the trap of then clicking on a link or file.

After the malware is downloaded and installed, a back door opens, which allows the attacker top gain complete control of the system

Microsoft said it was investigating the report issued by McAfee, but determined that IE 6, 7 and 8, did contain the security vulnerability.

More by Author

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends & analysis

Must Read