Internet Explorer

Microsoft issues Internet Explorer zero-day warning, but there’s no patch yet

Microsoft has warned Windows users that there is an unpatched zero-day vulnerability in Internet Explorer that is being exploited in targeted attacks.

A third-party patch for Microsoft’s Internet Explorer zero-day vulnerability

Don’t want to wait for Microsoft to fix the problem in how Internet Explorer handles .MHT files? Other security researchers come to the rescue.

bitdefender.com

It doesn’t matter if you don’t use Internet Explorer, you could still be at risk from this IE zero-day vulnerability

Even if you don’t use Internet Explorer any more, it may still be posing a potential risk by being installed on your Windows PCs.

Read more in my article on the Hot for Security blog.

tripwire.com

Zero-day flaw exploited in targeted attacks is fixed by Microsoft

This month’s Patch Tuesday bundle of updates from Microsoft included a fix for a critical vulnerability that has been actively exploited by at least one hacking gang in targeted attacks.

Read more in my article on the Tripwire State of Security blog.

welivesecurity.com

Patch now! Microsoft fixes over 50 serious security flaws

This week saw the second Tuesday of the month, and everyone who is responsible for protecting Windows computers knows what that means: another bundle of security patches have been released by Microsoft.

Read more in my article on the We Live Security blog.

PornHub visitors hit with malware attack via poisoned ads

Poisoned ads served up by the X-rated adult PornHub site tricked users into installing malicious browser updates.

bitdefender.com

Internet Explorer bug can reveal the contents of your address bar

If you’re one of the many people still using Microsoft Internet Explorer to surf the internet, you have just been given another good reason to upgrade to a more modern browser.

Read more in my article on the Hot for Security blog.

The Magala trojan makes its money dishonestly by clicking on ads in your browser

Every click, a few cents are made…

David Bisson reports.

How to delete cookies, clear your cache, and wipe your history in Internet Explorer

David Bisson explains how Internet Explorer users can clear their caches, browsing history, and cookies for better privacy.

Google tells world how to crash Microsoft Internet Explorer and Edge browsers

Google’s Project Zero vulnerability research team has published details of a flaw in the Microsoft Windows 10 Edge and Internet Explorer 11 browsers that allow them to be remotely crashed – without waiting for a fix to be released.

‘Zombie script’ deluges Internet Explorer 11 with pop-up alerts until user closes tab

A ‘zombie script’ could allow attackers to deluge Internet Explorer 11 users with pop-up alerts until they close the tab.

David Bisson reports.

Neutrino exploit kit adds former IE zero-day flaw to its arsenal

Guess what happened after vulnerability researchers published proof-of-concept code exploiting an Internet Explorer vulnerability?

A notorious exploit kit incorporated the code into its own arsenal.

David Bisson reports.

tripwire.com

IE under attack! Microsoft releases emergency out-of-band patch

As long as there are people in the business of finding and exploiting zero-day vulnerabilities, we’re likely to keep on finding ourselves installing emergency patches.

Read more in my article on the Tripwire State of Security blog.

Internet Explorer is dead. Long live… umm… How about some of these names?

Apparently, Microsoft is not so keen on the name “Internet Explorer” any more.

Find out what they’ve got planned, and some of my suggestions for a new name.

Buggy Norton Internet Security update crashes Internet Explorer

Make sure you have a back-up browser on your PC, just in case you need to check a Symantec support advisory next time a Norton security update busts Internet Explorer.

bitdefender.com

Major Internet Explorer vulnerability could lead to convincing phishing attacks

A serious security flaw in Internet Explorer has been uncovered that could be exploited by malicious hackers to launch convincing phishing attacks and inject malicious code into users’ browsers as they visit websites.

Learn more in my article on the Hot for Security blog.