Hackers target yet ANOTHER Internet Explorer hole

Same story (it seems), well it has the same heading, and the heading has been highlighted for the last couple of months now already. In any case, Microsoft said they are investigating another hole that cyber attackers are taking advantage of in IE 6 and IE 7. Again…

"At this time, we are aware of targeted attacks attempting to use this vulnerability," Microsoft said in an advisory posted along with a routine release of patches for Windows and Office software.

"We will continue to monitor the threat environment and update this advisory if this situation changes."

This flaw does the same as most previous reported flaws, which is to remotely seize control of computers. Strangely though, IE 5 and IE 8 are not affected. Time will tell how many unsafe holes there still are in IE 6 and IE 7, and in all honesty, people should really start considering getting a updated version of IE, or Microsoft should start fixing holes!

Microsoft on Tuesday warned that hackers are targeting yet another weakness in Internet Explorer 6 and 7

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this white paper by EMA, you'll learn how application discovery and dependency mapping can help you: Meet granular targets for availability, cost, and time-to-revenue for cloud services. Accelerate mean time to repair (MTTR) while communicating better with stakeholders. Manage even the most complex hybrid environments more efficiently and effectively Understand the …

  • Rocket Mobile® for IBM i is an enterprise mobile application development and deployment platform for customers who rely on the IBM i system. Rocket Mobile for IBM i enables customers to leave proven applications in-place and rapidly repurpose them into new managed and secure mobile applications. Fast, easy creation of mobile, web, and hybrid mobile applications that deploy to any iOS, Android, or Windows mobile phone or tablet Built-in integration for seamless repurposing of existing IBM i applications …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date