We’ve noticed about highly targeted in addition to evidently politically motivated attacks against our users. We believe activists may bring been a specific target. We’ve besides seen attacks against users of about other pop social site. All these attacks abuse a publicly-disclosed MHTML vulnerability for which an exploit was publicly posted inwards Jan 2011. Users browsing alongside the Internet Explorer browser are affected.
For now, nosotros recommend concerned users in addition to corporations seriously consider deploying Microsoft’s temporary Fixit to block this ready on until an official while is available.
To assist protect users of our services, nosotros bring deployed diverse server-side defenses to brand the MHTML vulnerability harder to exploit. That said, these are non tenable long-term solutions, in addition to nosotros can’t guarantee them to live on 100% reliable or comprehensive. We’re working alongside Microsoft to prepare a comprehensive solution for this issue.
The abuse of this vulnerability is besides interesting because it represents a novel character inwards the exploitation of web-level vulnerabilities. To date, like attacks focused on lead compromising users' systems, every bit opposed to leveraging vulnerabilities to interact alongside web
services.
News Source : Googleonlinesecurity
For now, nosotros recommend concerned users in addition to corporations seriously consider deploying Microsoft’s temporary Fixit to block this ready on until an official while is available.
To assist protect users of our services, nosotros bring deployed diverse server-side defenses to brand the MHTML vulnerability harder to exploit. That said, these are non tenable long-term solutions, in addition to nosotros can’t guarantee them to live on 100% reliable or comprehensive. We’re working alongside Microsoft to prepare a comprehensive solution for this issue.
The abuse of this vulnerability is besides interesting because it represents a novel character inwards the exploitation of web-level vulnerabilities. To date, like attacks focused on lead compromising users' systems, every bit opposed to leveraging vulnerabilities to interact alongside web
services.
News Source : Googleonlinesecurity
Share This :
comment 0 Comments
more_vert