![]() ![]() Microsoft found itself in hot water with this. Department of Homeland Security even advised not to use Internet Explorer until the patch is in place. In other words it isn’t a pleasant situation: The U.S. This is made possible with Internet Explorer because Flash runs within the same process space as the browser.” CERT also acknowledges that exploitation without the use of Flash may be possible, even though disabling a Flash plugin in IE is one of the workarounds for the problem. According to CERT’s description, “the Internet Explorer vulnerability is used to corrupt Flash content in a way that allows ASLR to be bypassed via a memory address leak. In short, by convincing a user to view a specially crafted HTML document attackers are able to execute an arbitrary code in the system. There is a large amount of technical data on the vulnerability itself. It really didn’t take long before a new version of the exploit was discovered, this time targeting Windows XP machines running Internet Explorer 8. Apparently, it was FireEye that discovered those attacks in the first place.Īccording to FireEye’s data, the initial attack targeted users of IE versions 9, 10, and 11 on Windows 7 and 8, although the vulnerability actually affected all versions of IE from 6 to 11. ![]() On April 26, 2014, Microsoft notified its customers of a vulnerability in Internet Explorer along with a zero-day exploit that has already been used in the wild – in “limited, targeted attacks”. Now it looks like those doom-spellers were right: it didn’t take long before a new bug affecting Windows XP was discovered: a vulnerability present in all, more or less, current versions of Internet Explorer. Without technical support from Microsoft, there will be no new patches for these bugs, so they can be exploited indefinitely, and this is actually a threat to everyone, not just Windows XP aficionados. Windows XP may have been discarded by Microsoft, but there are still millions of people using it, which means that malware writers and hackers are going to look hard for new bugs and vulnerabilities to exploit. Just before this happened, many voices were predicting doom, and, frankly, there was at least some merit in their arguments. And it did.Īs we all know, as of April 8th, 2014 Windows XP has ‘officially’ gone off into the sunset: it’s no longer supported by Microsoft. Internet Explorer 8 is truly a giant step forward, and proves that Microsoft is working hard to offer a more secure, compatible and customizable browser.Microsoft had to deal with a new less-than-pleasant vulnerability in Internet Explorer browser, which affected all of its versions starting with IE6 in all of its operational systems including the recently ‘discarded’ Windows XP. As for security, Internet Explorer 8 includes the so-called SmartScreen filter, which prevents you from entering fraudulent websites and protects you from online phishing scams. ![]() While InPrivate Browsing is on, the browser won't save data, including cookies, history and temporary Internet files. Internet Explorer 8 includes InPrivate Browsing, Internet Explorer's version of the popular Chrome Incognito mode. Besides that, everything else is in place: the address bar is again on top of the interface, and Favorites are accessible via a drop-down menu. The interface of Internet Explorer 8 hasn't changed that much compared to older versions, except for one small detail the menu bar is back and shows up by default again. ![]() One of them, the ' Suggested sites' function, recommends new websites you may not know about, based on your browsing history. It comes in really handy for tracking small changes that can't be followed by RSS, without having to visit the site: online auction bids, stock exchange values, weather information and more.īesides these two tools, Internet Explorer 8 also includes many interesting new features. Regarding Internet Explorer's Web Slices, these are a kind of RSS-style tool that tracks changes and updates to selected websites and keeps you informed about them. ![]()
0 Comments
Leave a Reply. |