Comment Really? (Score 1) 61
the Trojan gets delivered to users via the Rig exploit kit, which uses Flash and Silverlight exploits. The victims get saddled with the malware when they unknowingly visit a website hosting the exploit kit
Say it isn't so! Flash and Silverlight got used as a security hole? Well, I'm truly shoc
Flash has been a gaping security hole about as long as it has existed.
I can only assume Silverlight is little better, but the only browser I have it in is IE on a work machine because we need it to run some in-house software.
But I don't let that browser touch the real internet. Because I don't let IE access the internet unless every other browser has failed.
I'm afraid I no longer have any sympathy when I hear people got hacked via Flash. Because at this point, it's hardly surprising.