Many readers will remember how on Monday, July 19, a blog
entry appeared on ESET's blog on Habrahabr,
announcing the appearance of a malicious program that could penetrate the system through specially designed shortcut icons.
In this blog post (at the end of it), it was recommended that you
read the tips on the blog of an independent researcher (named Didier Stevens), who recommended cutting down the launch of files from USB and CD or downloading them from there to memory.
Many relaxed, and meanwhile, this is not over.
')
On July 20, Microsoft
laid out , and on June 21, the Security Lab website
reprinted an update of the previous news. The update says that to attack the July vulnerability it may not be necessary to have either a flash drive or a CD (or divyuk). Instead, it is enough for an attacker to create a specific website in a special way and just wait for the user to log in using Internet Explorer; and as soon as Windows tries to load the icon indicated on the site, everything will be over.
Now the real fun begins. In comments to the blog ESET, it seems ironic, only fans of Linux; but now, oh! now it is finally time to call also for switching to Firefox, Chrome, Safari, Opera, SeaMonkey, and so on and so forth. And genuine deep horror will cover all those who climb the Web through IE or through any other sinister thing, IE based on Maxthon, Netscape
in IE mode, Firefox
with IE tab, Chrome Frame, and so on and so forth.
Doomsday Explorer!