{"id":185027,"date":"2010-01-15T13:58:46","date_gmt":"2010-01-15T18:58:46","guid":{"rendered":"http:\/\/www.readwriteweb.com\/archives\/german_governments_warns_citizens_not_to_use_internet_explorer.php"},"modified":"2010-01-15T13:58:46","modified_gmt":"2010-01-15T18:58:46","slug":"after-operation-aurora-german-government-says-dont-use-internet-explorer","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/185027","title":{"rendered":"After Operation Aurora, German Government Says Don&#8217;t Use Internet Explorer"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" alt=\"aurora_logo_jan09.jpg\" src=\"http:\/\/www.readwriteweb.com\/images\/aurora_logo_jan09.jpg\" width=\"150\" height=\"84\"\/>According to Internet security company <a href=\"http:\/\/siblog.mcafee.com\/cto\/operation-\"aurora\"-hit-google-others\/\">McAfee<\/a>, a security vulnerability in Microsoft&#8217;s Internet Explorer allowed <a href=\"http:\/\/www.readwriteweb.com\/archives\/sources_claim_chinese_government_involvement_in_attacks.php\">hackers in China<\/a> to attack Google, Adobe and a large number of other companies, including Yahoo and Northrop Grumman. Microsoft has <a href=\"http:\/\/www.microsoft.com\/technet\/security\/advisory\/979352.mspx\">acknowledged<\/a> this vulnerability and is currently working on a patch. Every machine running Internet Explorer 6, 7 and 8 on virtually every modern Windows operating system is affected by this vulnerability. In an unprecedented move, the German government has now told its citizens to avoid using Internet Explorer for the time being.<\/p>\n<p align=\"right\"><em>Sponsor<\/em><br \/><a href='http:\/\/d.ads.readwriteweb.com\/ck.php?n=a6d5ead9&amp;cb=17790' ><img src='http:\/\/d.ads.readwriteweb.com\/avw.php?zoneid=14&amp;cb=17790&amp;n=a6d5ead9' border='0' alt='' \/><\/a><\/p>\n<p>McAfee analysis showed that whoever tried to hack Google was using a previously unknown security vulnerability in Internet Explorer. It currently looks like the attackers targeted specific individuals and fooled them into opening a link or downloading a file onto their computers. Earlier reports <a href=\"http:\/\/blogs.pcmag.com\/securitywatch\/2010\/01\/adobe_and_google_both_reveal_i.php\">claimed<\/a> that a vulnerability in Adobe Acrobat made these attacks possible.<\/p>\n<h2>Infect, Conceal Access and Siphon Data<\/h2>\n<p>McAffee&#8217;s chief technology officer George Kurtz notes that this attack is a good example of the types of attacks that governments and large organizations are currently faced with. This new generation of malware is highly targeted and &#8220;designed to infect, conceal access, siphon data or, even worse, modify data without detection.&#8221;<\/p>\n<p>According to the German government, users should switch to alternative browsers, as other hackers will surely start to exploit this same vulnerability within days.<\/p>\n<p><em>Image credit: <a rel=\"cc:attributionURL\" href=\"http:\/\/www.flickr.com\/photos\/nickrussill\/\">Flickr user nickrussill<\/a> \/ <a rel=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\">CC BY 2.0<\/a><\/div>\n<p><\/em><\/p>\n<p><strong><a href=\"http:\/\/www.readwriteweb.com\/archives\/german_governments_warns_citizens_not_to_use_internet_explorer.php#comments-open\">Discuss<\/a><\/strong><\/p>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/WmkW-azLrwOhgTndaJ3vWQE2QDY\/0\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/WmkW-azLrwOhgTndaJ3vWQE2QDY\/0\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/WmkW-azLrwOhgTndaJ3vWQE2QDY\/1\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/WmkW-azLrwOhgTndaJ3vWQE2QDY\/1\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?a=vKF5RSI4c30:xt82f0YzpSs:FFnlKYwJmN0\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?d=FFnlKYwJmN0\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?a=vKF5RSI4c30:xt82f0YzpSs:Ij26kaj3iuU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?d=Ij26kaj3iuU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?a=vKF5RSI4c30:xt82f0YzpSs:C2pbw5bZMiI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?d=C2pbw5bZMiI\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?a=vKF5RSI4c30:xt82f0YzpSs:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?a=vKF5RSI4c30:xt82f0YzpSs:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?i=vKF5RSI4c30:xt82f0YzpSs:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?a=vKF5RSI4c30:xt82f0YzpSs:gIN9vFwOqvQ\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?i=vKF5RSI4c30:xt82f0YzpSs:gIN9vFwOqvQ\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?a=vKF5RSI4c30:xt82f0YzpSs:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?i=vKF5RSI4c30:xt82f0YzpSs:F7zBnMyn0Lo\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?a=vKF5RSI4c30:xt82f0YzpSs:OqabYuBsmOY\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/readwriteweb?d=OqabYuBsmOY\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/readwriteweb\/~4\/vKF5RSI4c30\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Internet security company McAfee, a security vulnerability in Microsoft&#8217;s Internet Explorer allowed hackers in China to attack Google, Adobe and a large number of other companies, including Yahoo and Northrop Grumman. Microsoft has acknowledged this vulnerability and is currently working on a patch. Every machine running Internet Explorer 6, 7 and 8 on [&hellip;]<\/p>\n","protected":false},"author":592,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-185027","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/185027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/592"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=185027"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/185027\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=185027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=185027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=185027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}