Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

F-Secure Internet Security 2010 Blocked “Operation Aurora” Before It Happened

F-Secure Internet Security 2010 has a unique feature called Exploit Shield which blocked the “Aurora” Internet Explorer exploit proactively. It did this before the attacks were made and before anyone knew about the vulnerability.
  • 21 January, 2010 11:48

<p>F-Secure’s powerful Exploit Shield, a feature in Internet Security 2010 and F-Secure’s business solutions, gives computer users protection against malicious exploits of software vulnerabilities such as the infamous "Operation Aurora" espionage attack against Google and several other technology companies. This recently discovered exploit for the Internet Explorer browser, known as CVE 2010-0249, can allow outsiders to remotely control infected computers.</p>
<p>New vulnerabilities are constantly being discovered and software manufacturers issue patches to fix these security problems while criminals seek to exploit the unpatched vulnerabilities in order to gain access to systems and data. Attacks against vulnerabilities which are not known by the software vendors at the time of the exploitation are known as zero-day exploits. Traditional antivirus solutions are only able to protect against attacks that have been seen and analysed and provide no protection against zero-day exploits.</p>
<p>Wing Fei Chia, Senior Manager - Security Response at F-Secure’s Security Lab in APAC, says, “F-Secure’s unique Exploit Shield has been designed to protect computers against new, unknown attacks during the crucial period before a patch fixing a security vulnerability is issued. That’s when the security hole is still open to be exploited by the criminals. The Exploit Shield kicks into action at the first sign of suspicious computer behavior, even without prior knowledge of the specific vulnerability and related exploit. For example, thanks to the Exploit Shield we were able to block the “Aurora” exploit proactively – before the attacks were made.”</p>
<p>The Exploit Shield also instantly reports to F-Secure’s real-time protection network about new exploits and malicious websites that spread drive-by downloads. This means all F-Secure customers around the world benefit from better protection by getting a warning sign not to enter a malicious or hacked website through the Browsing Protection feature in Internet Security 2010 and F-Secure’s business solutions.</p>
<p>The recent spate of targeted zero-day attacks against a number of companies also demonstrates that the F-Secure Exploit Shield is an essential armor for businesses in the battle against cybercrime and espionage. All the latest versions of F-Secure consumer and business solutions include the Exploit Shield as part of their Browsing Protection features.</p>
<p>The Exploit Shield in F-Secure Internet Security 2010 and business solutions provides:</p>
<p>• Zero Day Defense: Protects unpatched machines.</p>
<p>• Patch-Equivalent Protection: Vulnerability "shield" updates.</p>
<p>• Proactive Measures: Heuristic detection techniques.</p>
<p>• Protection Against All Websites: Whether they are trusted, untrusted, malicious or hacked.</p>
<p>• Automatic Feedback: detected exploit attempts are automatically reported to F-Secure.</p>
<p>There's more about “Operation Aurora” and how F-Secure blocks it in our blog. The post includes a video of the Exploit Shield in action:</p>
<p>More about F-Secure Internet Security 2010 and F-Secure’s business solutions:</p>
<p>F-Secure – Protecting the irreplaceable</p>
<p>While you concentrate on what is important to you, we make sure you are protected and safe online whether you are using a computer or a smartphone. We also backup and enable you to share your important files. Our services are available through over 200 operators around the world and trusted in millions of homes and businesses. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki Ltd.</p>
<p> | |</p>

Most Popular

Brand Post

Most Popular Reviews

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest Articles


PCW Evaluation Team

Luke Hill


I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?