- Apr 26, 2011
- 2,779
Attackers typically exploit weaknesses in websites, for example, taking advantage of out-of-date WordPress implementations to upload their own content to servers. Then, through spam or phishing campaigns, herd unsuspecting users to these "drive-by" sites, which in turn exploit the users directly.
MORE:
http://www.zdnet.com/ie-zero-day-activel...000021249/