Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

F-Secure Internet Security 2010 Blocked “Operation Aurora” Before It Happened

F-Secure Internet Security 2010 has a unique feature called Exploit Shield which blocked the “Aurora” Internet Explorer exploit proactively. It did this before the attacks were made and before anyone knew about the vulnerability.
  • 21 January, 2010 11:48

<p>F-Secure’s powerful Exploit Shield, a feature in Internet Security 2010 and F-Secure’s business solutions, gives computer users protection against malicious exploits of software vulnerabilities such as the infamous "Operation Aurora" espionage attack against Google and several other technology companies. This recently discovered exploit for the Internet Explorer browser, known as CVE 2010-0249, can allow outsiders to remotely control infected computers.</p>
<p>New vulnerabilities are constantly being discovered and software manufacturers issue patches to fix these security problems while criminals seek to exploit the unpatched vulnerabilities in order to gain access to systems and data. Attacks against vulnerabilities which are not known by the software vendors at the time of the exploitation are known as zero-day exploits. Traditional antivirus solutions are only able to protect against attacks that have been seen and analysed and provide no protection against zero-day exploits.</p>
<p>Wing Fei Chia, Senior Manager - Security Response at F-Secure’s Security Lab in APAC, says, “F-Secure’s unique Exploit Shield has been designed to protect computers against new, unknown attacks during the crucial period before a patch fixing a security vulnerability is issued. That’s when the security hole is still open to be exploited by the criminals. The Exploit Shield kicks into action at the first sign of suspicious computer behavior, even without prior knowledge of the specific vulnerability and related exploit. For example, thanks to the Exploit Shield we were able to block the “Aurora” exploit proactively – before the attacks were made.”</p>
<p>The Exploit Shield also instantly reports to F-Secure’s real-time protection network about new exploits and malicious websites that spread drive-by downloads. This means all F-Secure customers around the world benefit from better protection by getting a warning sign not to enter a malicious or hacked website through the Browsing Protection feature in Internet Security 2010 and F-Secure’s business solutions.</p>
<p>The recent spate of targeted zero-day attacks against a number of companies also demonstrates that the F-Secure Exploit Shield is an essential armor for businesses in the battle against cybercrime and espionage. All the latest versions of F-Secure consumer and business solutions include the Exploit Shield as part of their Browsing Protection features.</p>
<p>The Exploit Shield in F-Secure Internet Security 2010 and business solutions provides:</p>
<p>• Zero Day Defense: Protects unpatched machines.</p>
<p>• Patch-Equivalent Protection: Vulnerability "shield" updates.</p>
<p>• Proactive Measures: Heuristic detection techniques.</p>
<p>• Protection Against All Websites: Whether they are trusted, untrusted, malicious or hacked.</p>
<p>• Automatic Feedback: detected exploit attempts are automatically reported to F-Secure.</p>
<p>There's more about “Operation Aurora” and how F-Secure blocks it in our blog. The post includes a video of the Exploit Shield in action:</p>
<p>More about F-Secure Internet Security 2010 and F-Secure’s business solutions:</p>
<p>F-Secure – Protecting the irreplaceable</p>
<p>While you concentrate on what is important to you, we make sure you are protected and safe online whether you are using a computer or a smartphone. We also backup and enable you to share your important files. Our services are available through over 200 operators around the world and trusted in millions of homes and businesses. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki Ltd.</p>
<p> | |</p>

Most Popular

Most Popular Reviews

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest Articles


PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Jack Jeffries


As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr


The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?