mailing list archives
Re: How often are IE security holes exploited?
From: gobbbles () hushmail com
Date: Thu, 12 Dec 2002 22:20:06 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Richard M. Smith wrote:
Has anyone ever looked into how often security holes in Internet
Explorer are actually used in viruses, worms, Trojan horses, and other
malware? My sense is that very few of them are actually used in the
If you look at "hacker kit" codes which would do this...
The question is, how can they be detected, if they are not detected by any user? How will anti-virus learn of it, if
the trojaned exploit code is unknown to them and no user has found it? Or, what if that user browses pedophile
newsgroups and mailing lists? Would they be so anxious to report a trojan on their system? And, how would they ever
figure out how they got it?
Was it spam email number 76876, or maybe website number 565579?
And, why wouldn't someone want to be able to say... target all neo-nazi's reading alt.politics.white-power... if they
realize they have their whole audience right there in the newsgroup?
Or, what about that company that has all of its' employees firewalled? Kind of conveniant way to grab a few of them to
make one's way into the system.
Also, as you may have noticed, email is rather insecure/private/can be really hard to trace. Especially if you use
enough proxies and then feed it through your most paranoid remailer.
"My names in the book, look it up"
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.2 (Java)
Note: This signature can be verified at https://www.hushtools.com/verify
-----END PGP SIGNATURE-----
Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2
Big $$$ to be made with the HushMail Affiliate Program:
Full-Disclosure - We believe in it.