Hi, Has anyone ever looked into how often security holes in Internet Explorer are actually used in viruses, worms, Trojan horses, and other malware? My sense is that very few of them are actually used in the wild. The KaK and Klez worms both use IE security holes to do their dirty work, but most other Windows viruses seem to rely on social engineering and standard features of Microsoft products.
If folks know of other malware that make use of IE security holes, please let me know. I'm putting together a little list. Thanks, Richard M. Smith http://www.ComputerBytesMan.com ################################################################# ################################################################# ################################################################# ##### ##### ##### ################################################################# ################################################################# ################################################################# _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
