Content deleted Content added
m →Exploitation via COM: Explain why sandbox is better |
|||
Line 80:
Over the years, numerous attacks were targeted toward Internet Explorer. The embedding of COM into the Internet Explorer created a combination of functions that provides a gateway for explosion of [[computer virus]], [[Trojan horse (computing)|trojan]] and [[spyware]] infections. These [[malware]] attacks mostly depend on ActiveX for their activation and propagation to other computers. Microsoft has recognized the problem with ActiveX since 1996 when Charles Fitzgerald, program manager of Microsoft's Java team [http://www.javaworld.com/javaworld/jw-03-1997/jw-03-component.web97.html said], ''"If you want security on the 'Net', unplug your computer. … We never made the claim up front that ActiveX is intrinsically secure."''.
One of the main problems in Internet Explorer's security measure is the total reliance on human judgment. Also, ActiveX security relies solely on security zones and digital signing, which was utilized by malware multiple times. One of the common techniques is to mark malicious pages incorrectly under
The forth-coming [[Microsoft AntiSpyware]], which is currently in beta, monitors BHOs in Internet Explorer on Windows 2000, XP and Server 2003, and will warn the user before a new BHO is installed.
|