French CERT advises to stop using IE - Microsoft only IE6 effective - CYBERsitter sues Republic of China for phising attack

Following Germany’s advisory; The French Computer Emergency Response Team (CERT) published an advisory stating “pending a patch from the publisher, CERT recommends using an alternative browser.” In the advisory Internet Explorer 7 and 8 are both listed as effected, alongwith IE6, despite Microsoft confirming the vulnerability is only exploitable on Internet Explorer 6. Meanwhile, Microsoft […]

Following Germany’s advisory; The French Computer Emergency Response Team (CERT) published an advisory stating “pending a patch from the publisher, CERT recommends using an alternative browser.” In the advisory Internet Explorer 7 and 8 are both listed as effected, alongwith IE6, despite Microsoft confirming the vulnerability is only exploitable on Internet Explorer 6. Meanwhile, Microsoft posted an update to its advisory 979352 stating that “the attacks that we have seen to date, including public proof-of-concept exploit code, are only effective against Internet Explorer 6. Based on a rigorous analysis of multiple sources, we are not aware of any successful attacks against IE7 and IE8 at this time.” In a related new, “CYBERsitter software company specialising in web filtering software, has sued the People's Republic of China, two Chinese software makers, and seven computer manufacturers for distributing web filtering software called “Green Dam” with their intellectual property illegally included. CYBERsitter is reporting that they too were attacked this week, with the attack originating from China. In a phone interview, Elliot Gipson of Gipson Hoffman & Pancione described what was another spear-phishing attack - the exact same exploit used against Google in China in late December last year.”