Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

F-Secure Internet Security 2010 Blocked “Operation Aurora” Before It Happened

F-Secure Internet Security 2010 has a unique feature called Exploit Shield which blocked the “Aurora” Internet Explorer exploit proactively. It did this before the attacks were made and before anyone knew about the vulnerability.
  • 21 January, 2010 11:48

<p>F-Secure’s powerful Exploit Shield, a feature in Internet Security 2010 and F-Secure’s business solutions, gives computer users protection against malicious exploits of software vulnerabilities such as the infamous "Operation Aurora" espionage attack against Google and several other technology companies. This recently discovered exploit for the Internet Explorer browser, known as CVE 2010-0249, can allow outsiders to remotely control infected computers.</p>
<p>New vulnerabilities are constantly being discovered and software manufacturers issue patches to fix these security problems while criminals seek to exploit the unpatched vulnerabilities in order to gain access to systems and data. Attacks against vulnerabilities which are not known by the software vendors at the time of the exploitation are known as zero-day exploits. Traditional antivirus solutions are only able to protect against attacks that have been seen and analysed and provide no protection against zero-day exploits.</p>
<p>Wing Fei Chia, Senior Manager - Security Response at F-Secure’s Security Lab in APAC, says, “F-Secure’s unique Exploit Shield has been designed to protect computers against new, unknown attacks during the crucial period before a patch fixing a security vulnerability is issued. That’s when the security hole is still open to be exploited by the criminals. The Exploit Shield kicks into action at the first sign of suspicious computer behavior, even without prior knowledge of the specific vulnerability and related exploit. For example, thanks to the Exploit Shield we were able to block the “Aurora” exploit proactively – before the attacks were made.”</p>
<p>The Exploit Shield also instantly reports to F-Secure’s real-time protection network about new exploits and malicious websites that spread drive-by downloads. This means all F-Secure customers around the world benefit from better protection by getting a warning sign not to enter a malicious or hacked website through the Browsing Protection feature in Internet Security 2010 and F-Secure’s business solutions.</p>
<p>The recent spate of targeted zero-day attacks against a number of companies also demonstrates that the F-Secure Exploit Shield is an essential armor for businesses in the battle against cybercrime and espionage. All the latest versions of F-Secure consumer and business solutions include the Exploit Shield as part of their Browsing Protection features.</p>
<p>The Exploit Shield in F-Secure Internet Security 2010 and business solutions provides:</p>
<p>• Zero Day Defense: Protects unpatched machines.</p>
<p>• Patch-Equivalent Protection: Vulnerability "shield" updates.</p>
<p>• Proactive Measures: Heuristic detection techniques.</p>
<p>• Protection Against All Websites: Whether they are trusted, untrusted, malicious or hacked.</p>
<p>• Automatic Feedback: detected exploit attempts are automatically reported to F-Secure.</p>
<p>There's more about “Operation Aurora” and how F-Secure blocks it in our blog. The post includes a video of the Exploit Shield in action:</p>
<p>More about F-Secure Internet Security 2010 and F-Secure’s business solutions:</p>
<p>F-Secure – Protecting the irreplaceable</p>
<p>While you concentrate on what is important to you, we make sure you are protected and safe online whether you are using a computer or a smartphone. We also backup and enable you to share your important files. Our services are available through over 200 operators around the world and trusted in millions of homes and businesses. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki Ltd.</p>
<p> | |</p>

Most Popular



Sansai 6-Outlet Power Board + 4-Port USB Charging Station

Learn more >



Back To Business Guide

Click for more ›

Brand Post

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest Articles


PCW Evaluation Team

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?