In relation to the latest 'shortcut file' exploit

I want to know if blocking .lnk files in removable media and for web-browsers would help?

I was thinking of adding the temporary-files directories of Internet Explorer and Google Chrome to Blocked Files. Will doing this mitigate the threat?

The answer to both questions is no.

Refer, if you are running windows, to the last windows patch against this threat or follow the discussions in this same forum about this question.

The .lnk flaw is only related to the fact that unpatched windows is able to load the malware, itself not a .lnk file (and as far as i know, .lnk is not executable) using other process (rundll) by only exploring such a file, without even speaking of right-clicking it or even to be dumb enough to make a left-click.

As illustrated in this forum, the only way outside of the windows patch to block such a malware is to set your security software (why not defense+) to intercept every dll file, but such a rule is quite unfriendly.