8 Internet Explorer holes fixed

WEBINAR: On-demand webcast

How to Boost Database Development Productivity on Linux, Docker, and Kubernetes with Microsoft SQL Server 2017 REGISTER >

Microsoft acknowledged that they have known about the hole for about 4 months, while issuing the critical update for IE 5 to 8; after the attacks on Google and about 30 other companies earlier this month.

Trojan.Malscript and JS_DLoader are just some of the identified new malware scripts targeting the IE (especially IE 6) holes, which has been exposed since 20 December last year, according to Websense

A total of eight vulnerabilities were fixed by a critical patch issued on Thursday

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • In order for IT service providers to succeed, it's paramount that they find a competitive advantage and continually develop new ways to find additional revenue streams. IT service providers need to be able to do it all for their clients – from managing entire technology infrastructures to responding quickly to a multitude of end-user needs. With a growing number of issues to resolve and limited technicians at hand, how can IT service providers operate efficiently while providing top-notch service …

  • Virtual, Physical, and Cloud based servers. Each of the three has its own strengths and weaknesses. Each also introduces its own set of issues for data backup and recovery management, business service levels, and costs. Simplifying how data is stored, managed, backed up and recovered across these platforms can bring direct and rapid benefits, without limiting storage choices. It's time for a more rational approach. It's time for a unified solution.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date