Linked by Thom Holwerda on Mon 18th Jan 2010 22:00 UTC
Internet Explorer Ah, the security vulnerability that was used in the Google attack. It's been around the internet about a million times now, and even governments have started advising people to move away from Internet Explorer. As is usually the case, however, the internet has really blown the vulnerability out of proportion. I'll get right to it: if your machine and/or network has been compromised via this vulnerability, then you most likely had it coming. No sympathy for you.
Permalink for comment 404944
To read all comments associated with this story, please click here.
Thom_Holwerda
Member since:
2005-06-29

Funny how when there's a proof of concept of a Linux or Mac vulnerability, it's all discarded as "it's not in the wild" and "show me a real infection" and so on...

...yet when it's Microsoft, proof of concepts and even regular concepts are accepted without so much as a blink of the eye.

Double standards. You has them.

On top of that, they bypassed DEP. What about protected mode? Did you buy (yes, you have to buy it) the concept to test it out? Or do you believe that security company's (BUY OUR PRODUCT) puppy eyes?

Edited 2010-01-19 16:30 UTC

Reply Parent Score: 1