RESEARCHER independent security, Rosario Valotta show proof that Internet Explorer is vulnerable to attacks that target personal data in the HTTP cookie.
Defect was left injection called cookiejacking. The method reportedly can be used hackers to access the cookies, and log into various accounts of victims online.
Vulnerability that requires the user to drag and drop items on the screen.
Volatta claims to have created applications for Facebook, which exploit the flaw attack. He could collect 80 cookies from a list of 150 friends on Facebook.
This vulnerability potentially affects all versions of Internet Explorer running on any edition of Windows.
But a spokesman for Microsoft said the opposite. Microsoft''suggests a need for user interaction. So there may be used in an actual hacking scenario,''said company spokesman Jerry Bryant told Reuters.
Defect was left injection called cookiejacking. The method reportedly can be used hackers to access the cookies, and log into various accounts of victims online.
Vulnerability that requires the user to drag and drop items on the screen.
Volatta claims to have created applications for Facebook, which exploit the flaw attack. He could collect 80 cookies from a list of 150 friends on Facebook.
This vulnerability potentially affects all versions of Internet Explorer running on any edition of Windows.
But a spokesman for Microsoft said the opposite. Microsoft''suggests a need for user interaction. So there may be used in an actual hacking scenario,''said company spokesman Jerry Bryant told Reuters.







0 komentar:
Post a Comment
Comment di sini ya chuy!!!