Hackers target yet ANOTHER Internet Explorer hole

Same story (it seems), well it has the same heading, and the heading has been highlighted for the last couple of months now already. In any case, Microsoft said they are investigating another hole that cyber attackers are taking advantage of in IE 6 and IE 7. Again…

"At this time, we are aware of targeted attacks attempting to use this vulnerability," Microsoft said in an advisory posted along with a routine release of patches for Windows and Office software.

"We will continue to monitor the threat environment and update this advisory if this situation changes."

This flaw does the same as most previous reported flaws, which is to remotely seize control of computers. Strangely though, IE 5 and IE 8 are not affected. Time will tell how many unsafe holes there still are in IE 6 and IE 7, and in all honesty, people should really start considering getting a updated version of IE, or Microsoft should start fixing holes!

Microsoft on Tuesday warned that hackers are targeting yet another weakness in Internet Explorer 6 and 7

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Today's competitive marketplace requires the organization to frequently release and deploy applications at the pace of user demands, with reduced cost, risk, and increased quality. This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive. Inside you will find: The business and technical drivers behind automated application release and deployment. Evaluation guides for application release and deployment solutions. …

  • Live Event Date: April 22, 2014 @ 1:00 p.m. ET / 10:00 a.m. PT Database professionals — whether developers or DBAs — can often save valuable time by learning to get the most from their new or existing productivity tools. Whether you're responsible for managing database projects, performing database health checks and reporting, analyzing code, or measuring software engineering metrics, it's likely you're not taking advantage of some of the lesser-known features of Toad from Dell. Attend this live …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds