8 Internet Explorer holes fixed

WEBINAR:
On-Demand

Application Security Testing: An Integral Part of DevOps


Microsoft acknowledged that they have known about the hole for about 4 months, while issuing the critical update for IE 5 to 8; after the attacks on Google and about 30 other companies earlier this month.

Trojan.Malscript and JS_DLoader are just some of the identified new malware scripts targeting the IE (especially IE 6) holes, which has been exposed since 20 December last year, according to Websense

A total of eight vulnerabilities were fixed by a critical patch issued on Thursday

View Article



Comments

  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • CEOs, CIOs, boards and shareholders are demanding digital transformation. They want their organizations to be more customer-focused, competitive and strategic to increase revenue. Data drives all of those aspects. A great first step in optimizing data use is moving data to the cloud. It can quickly show benefits. Here are six aspects of a cloud data management strategy that will help your organization more fully move, manage and use valuable data to successfully support digital transformation.

  • Mobility is reaching an inflection point in enterprise. Smart enterprises are moving away from tactical point solutions for mobile device management, looking instead for a secure, comprehensive, unified, and future-proof mobile-app platform. Enterprise applications are now at the heart of mobile productivity, data is shared outside the enterprise walls, and the data itself may reside on multiple devices and clouds. Read this guide to learn how a unified endpoint management (UEM) solution is critical to …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date