Today, exploiting vulnerabilities in legitimate programs is one of the most popular methods of infecting computers. According to our data, user machines are most often attacked using exploits for Oracle Java vulnerabilities. Today's security solutions, however, are capable of effectively withstanding drive-by attacks conducted with the help of exploit packs. In this article, we discuss how a computer can be infected using the BlackHole exploit kit and the relevant protection mechanisms that can be employed.

via Filling a BlackHole - Securelist.



My original entry is here: Filling a BlackHole - Securelist. It posted Mon, 09 Sep 2013 16:20:31 +0000.

Filed under: InfoSec,