Recently, Microsoft addressed twelve critical security flaws related to Internet Explorer (IE). Eleven of the patched security flaws allow attackers to attain user privileges through remote code execution. Security researchers at Symantec have identified active exploitation of one of these vulnerabilities by cyber-attackers. The security flaw affects IE 6, 7 and 8.
IE remains unaffected by the vulnerability. According to Symantec, attackers are apparently trying to exploit the vulnerability through target-based attacks. Security researchers of the security firm have identified one of the attacks, wherein attackers inserted the exploit code in a compromised web hosting content of a restaurant. Successful execution of the code would result in download of a malicious file from the website. Attackers allegedly inserted the code in an iframe tag, which links to an exploit page. Attackers may send e-mails to the target victims with the link to the compromised site. Unwary Internet users, who fall prey to the attack, and visit the compromised website may inadvertently download malicious file on their computer systems.
Usually, attackers attempt to steal confidential information through sophisticated attacks. IE users must immediately install the latest patch by Microsoft. The developer issues security bulletins on second Tuesday of every month. Microsoft addressed 34 security flaws in the latest patch release. Internet users must adhere to security advisories, update the security software, operating systems and web browsers to safeguard their systems, and secure data stored on them. They must avoid responding to e-mails arriving from unknown sources and risky file extensions. They must directly visit a legitimate website, rather than clicking on a link provided in the e-mails, even when they appear to arrive from known or legitimate sources. They must also be cautious of e-mails containing images arriving from both known and unknown sources. Attackers may spoof the e-mails of legitimate companies or government bodies to trick users into believing the contents of the e-mail.
Vulnerabilities are common in software products. Independent security researchers, experts affiliated to security firms and in-house security professionals often test software products for flaws. Attackers are proactive in identification and exploitation of vulnerabilities. There is usually a time lag between the release of the patch and their implementation by Internet users. Attackers take advantage of the time lag and exploit flaws in the software products. E-tutorials, online degree programs, security blogs and cyber security alerts may help Internet users to stay informed of latest security threats and adhere to precautionary measures.
Professionals qualified in masters of security science may help enterprises in timely identification, prioritization and application of appropriate security updates. IT professionals must train employees on the safe online computing practices, and alert them on latest security threats. Employees must verify the authenticity of e-mails that ask them to download files, reveal sensitive information or visit a website to avoid falling prey to scams and social engineering attacks. E-learning and online university degree programs may help employees in understanding and implementing information security practices. Proactive security measures are crucial to identify security threats and ward off potential security breach attempts by cyber-attackers.
Pages
Category
Techno
(122)
Gadget
(84)
Komputer
(81)
Smartphone
(76)
Internet
(74)
Tips dan Trik Komputer
(64)
Pernak pernik
(57)
Android
(51)
Facebook
(25)
Softwear
(22)
Computer Virus
(20)
Game
(18)
Antivirus
(15)
Job Application
(15)
Symbian
(15)
sex
(15)
Movie
(14)
Berita Unik
(13)
Kesehatan
(11)
Hardwear
(4)
BlackBerry
(3)
Gosip
(2)
Camfrog
(1)
Hukum
(1)
humor
(1)
Saturday, June 25, 2011
Security Experts Detect Active Exploitation of Vulnerability in Internet Explorer
Related Post
Techno
- Chimo NgeBlog : The 12 Most Vulnerable Smartphones
- Chimo NgeBlog : Smartphone Batteries are About to Get a Massive Upgrade
- Chimo NgeBlog : Top 5 Tech Highlights of the Month
- Chimo NgeBlog : Leaked Samsung Roadmap Reveals Nexus Prime Launch Date, 720p Super AMOLED Display
- Chimo NgeBlog : Hands On: Google+ App for iPad
- Chimo NgeBlog : 4 Top 4G Smartphones
- Chimo NgeBlog : HTC Status Facebook Phone Is Here
- Chimo Ngeblog : The Best Android Tablets
- Chimo NgeBlog : Sony Launches ''World's Lightest'' 13-Inch Laptop
- Chimo NgeBlog : SwiftKey Tablet X Review
Internet
- Chimo Ngeblog : Tips Aman Belanja Online
- Chimo Ngeblog : Membuat Account iTunes Tanpa Kartu Kredit
- Chimo NgeBlog : 6 Firefox extensions that Chrome should really have
- Chimo NgeBlog : SSDownloader: 50 security apps in just a few clicks
- Chimo NgeBlog : Fake Firefox update email - don't click, or you may have your passwords stolen
- Chimo NgeBlog : Helpful tips for using Google's Chrome browser
- Chimo NgeBlog : 5 things Google+ does better than Facebook and Twitter
- Chimo NgeBlog : 40 Google+ Tips and Tricks for Power Users
- Chimo NgeBlog : Top 10 features missing from Google+
- Chimo NgeBlog : Mozilla's BrowserID Aims to Eliminate Password Fuss
Subscribe to:
Post Comments (Atom)
0 komentar:
Post a Comment