![]() ![]() adds details on Windows XP-specific attack and comment from Robert Hansen. "All browsers have had similar issues in the past, and never received that sort of general warning." To get updates but allow your security settings to continue blocking potentially harmful ActiveX controls and scripting from other sites, make this site a trusted website: In Internet Explorer, click Tools, and then click Internet Options. Click the Advanced tab, and then click Reset. To reset Internet Explorer to the default settings, follow these steps: Start Internet Explorer, and then on the Tools menu, click Internet Options. "The bug itself was really bad, of course, but it was surprising to see such a knee-jerk reaction from the community, telling people to switch from Internet Explorer," he said. Restart Internet Explorer and verify the issue is resolved. To upgrade to the latest version of the browser, go to the Internet Explorer Downloads website. To use this site, you must be running Microsoft Internet Explorer 5 or later. Robert Hansen, the vice president of WhiteHat Security's advanced technology group, said that he was surprised at the visceral reaction that the US and UK governments, as well as many individuals, had to the vulnerability. Thanks for your interest in getting updates from us. That means that although there's a patch, the security firm is now seeing "live attacks" against Windows XP computers, which except for this patch are no longer being fixed by Microsoft. Meanwhile, as Microsoft was fixing the bug, FireEye discovered another exploit that used the same vulnerability, but targeted Internet Explorer 8. Childs said that Microsoft encourages Windows 7 and Windows 8.1 customers to update Internet Explorer to version 11, the latest release, if they haven't yet. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |