ActiveX has long been regarded as a thorn in the side of Windows users everywhere; a gaping hole through which spyware and viruses can contaminate your PC and compromise your data. Although much of ...
A software module based on Microsoft's Component Object Model (COM) architecture. It enables a program to add functionality by calling ready-made components that blend in and appear as normal parts of ...
The exploitation of ActiveX controls is not new to the security community. While initially designed to provide website authors with new embeddable features, and granting Internet Explorer (IE) users ...
ActiveX vulnerabilities have posed a security challenge for some time, and they're likely to be a challenge for quite some time to come. Look at examples such as Microsoft's patches this summer, which ...