New Security Flaw in IE

Discussion in 'Current Events' started by ColoJohnBoy, Oct 3, 2003.

  1. ColoJohnBoy macrumors 65816

    ColoJohnBoy

    Joined:
    Mar 10, 2003
    Location:
    Denver, Colorado
    #1
    (Link to story) http://story.news.yahoo.com/news?tmpl=story&u=/cmp/20031003/tc_cmp/15201154

    (TechWeb) - Vulnerabilities in Microsoft's Internet Explorer Web browser have been exploited again, security experts said on Thursday, this time by a Trojan horse that redirected traffic from more than 100 popular Web sites to an IP address designated by the attacker. The Trojan, dubbed Qhosts and Delude.B by various anti-virus vendors, redirected traffic on compromised machines from a large number of legitimate sites--primarily search engines, among them those found at AltaVista, Google, Lycos, MSN, and Yahoo. According to Computer Associates, requests to surf to those search sites were shunted instead to a Web site that was taken offline within 24 hours of the Trojan's appearance.

    How very interesting, especially in light of the lawsuits pending against MS.
     
  2. Stike macrumors 65816

    Stike

    Joined:
    Jan 31, 2002
    Location:
    Germany
    #2
    Way to go, Microsoft!! Keep making great software! Apple will thank you!

    :D :D :D
     
  3. ColoJohnBoy thread starter macrumors 65816

    ColoJohnBoy

    Joined:
    Mar 10, 2003
    Location:
    Denver, Colorado
    #3
    LOL - Definitely!

    When I worked at the Apple Store, it seemed more than half of the people that were buying computers were coming to Apple because they were fed up with Windows and the Microsoft Apps. The only complaint I ever heard regarding OSX or the iApps was that they were unfamiliar with it, but they all conceded that with time, they were sure they'd love it.

    So, yeah, keep up the good work Microsoft!
     
  4. MrMacMan macrumors 604

    MrMacMan

    Joined:
    Jul 4, 2001
    Location:
    1 Block away from NYC.
    #4
    Hehe, couldn't we report this every 3 days?


    ;)

    Eh how does it install the trogan?

    IE?

    Huhh?


    So you get someone to link them to a file, the exploit works it magic and their comp gets directed to other sites...

    Not really that amasing.
     

Share This Page