Hi Logos,
Yes I have posted about how to block all of China and Korea as such if parties would think this would help. Also reckon that a lot of malcreants outside of China operate there, that is what I meant with that rephrase.
Internet Explorer has a very serious zero-day security hole
The vulnerability through which the attackers on Google used, works on all flaws of IE and works on each and every platform. As far as we know they used the attack via Internet Explorer 6 an a malicious website. Internet Explorer 8 in combination with Data Execution Prevention (DEP) prevents the attack. Well Microsoft thinks about launching an emergency patch. According to the software vendor the attack has only be seen in very targeted attacks, but every firm should reckon with the threat’s danger.
“Complex attacks for specific corporational networks are often seen”, says Microsoft Security Response Center (MSRC)'s Mike Reavy. He says that the Protected Mode inside IE 7 on Windows Vista and beyond limits what attackers can do. Users also could enable Data Execution Prevention (DEP)here. Or use Firefox with NoScript and Request Policy extensions installed, because again and again Javascript is at the culprit of mentioned attack.
Trojan horse
The attack itself was launched using, yes again folks, JavaScript code abusing the zero-day holek in Internet Explorer, acoording to MacAfee’s Craig Schmugar. As soon as the OS was infested, the exploit installed a file drom a website, know taken offline. This file that installed a remote access Trojan (RAT), loading at start up. Malware also contacted a remote server, enabling the attacker access to the infected system. Schmugar confirms the attack cannot work with DEP installed,
polonus