Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

"Although the initial attack occurred when company employees visited a malicious web site, Alperovitch said researchers are still trying to determine if this occurred via a URL sent to employees via e-mail or instant messaging or some other method, such as Facebook or other social networking sites."

It still needed an employee to make the usual "install the dancing pigs"-style gaff while using IE6.

Also: Employees using IE6, inside Google, in 2010. Why weren't they using Chrome?



Also: Employees using IE6, inside Google, in 2010. Why weren't they using Chrome?

I guess they were testing something in IE6. Perhaps one of their own sites. Perhaps how some other site renders in it compared to Chrome. Who knows.


That'd be brilliant! Send a bug report that your site renders incorrectly in chrome but correctly in IE6. That's an almost guaranteed hit with a known browser!


The vulnerability was in IE 6, 7, and 8.

"Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6, Internet Explorer 7 and Internet Explorer 8 on supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are affected."

http://www.microsoft.com/technet/security/advisory/979352.ms...


Good security is multi-layered. Just because they relied on an old trick to get their foot in the door, doesnt mean they have bad security inside or at more sensitive parts.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: