Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computer
The research team from Qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on Internet Explorer.
A group of hackers are actively exploiting this vulnerability to control computers running Windows operating systems.
This vulnerability infects Office documents containing malware downloaded from IE. Malware will infiltrate and control the "User Accounts" section of the operating system, and jump on pop-ups that cause the device to be paralyzed.
According to experts, this group of hackers are also "hard at work on their own" because very few people now use IE (only 17.55%, even lower than this number) and users also. Very wary when opening unidentified Office files.
Still, researchers are calling on Microsoft to release an emergency patch to fix the flaw, as a small number of people remain loyal to the browser, especially organizations, The agency still selects IE as the default browser on its system.
See more:
- Warning: Detecting more than 1000 Cisco router and switch devices in Vietnam has a serious security error
- Only charging the battery through a computer, your iPhone may also be hacked
- Facebook awards 1 billion VND for those who find new data holes
- Hackers attack the casino through a hole in the smart thermometer of the aquarium
You should read it
- Microsoft has not patched security issues in IE8 for 7 months
- The 7 most common problems in Internet Explorer
- Ways to uninstall Internet Explorer 8 on Windows XP / Vista / 7
- Internet Explorer has vulnerabilities, unused users are still hacked
- Detecting vulnerabilities in BitTorrent applications allows hackers to control user computers
- Instructions to remove Internet Explorer 10 in Windows 8
- How to enable Internet Explorer mode on Microsoft Edge
- Microsoft released a serious patch in IE9 and Windows
May be interested
- Microsoft has not patched security issues in IE8 for 7 monthsaccording to security company zero day initiative, internet explorer 8 browser has appeared a security hole for more than half a year, but microsoft almost never bothered to fix this error.
- Detecting APT attack campaign on important national infrastructure on Tet holidaythe main purpose of hackers is to gain user control, then through it to attack internal computer systems to steal important information.
- Warning: Jenkins exists a serious security hole that helps hackers gain control of computers of many Vietnamese businesseslast night, september 18, vsec - vietnam cyber security joint stock company issued an emergency warning about a serious security hole in the open source application jenkins.
- Security for Microsoft Internet Explorersome software features that provide functionality for a browser such as activex, java, and scripting (javascript, vbscript ...) can also cause vulnerabilities to computer systems. they can arise from the poverty of protocol, design and software
- The 7 most common problems in Internet Explorersometimes you may find yourself in situations where you must use internet explorer. let's take a look at quick fixes for common internet explorer issues so you don't have trouble experimenting with this old browser.
- Ways to uninstall Internet Explorer 8 on Windows XP / Vista / 7internet explorer 8 has many new and useful features. however, in some cases, upgrading to internet explorer 8 can still cause problems. to resolve these problems, you can uninstall internet explorer 8 from the operating system.
- 8 safe ways to use IE8 for online purchaseshere are 8 tips, simple but very effective, to help online 'followers' protect themselves against hackers and viruses, along with internet explorer 8's web browser.
- Detecting a new Linux vulnerability allows hackers to gain control of the VPN connectioninternational security researchers have found an entirely new linux vulnerability that allows potential attackers to hijack vpn connections on the device * nix and 'inject' the arbitrary data payload into it. tcp4 and ipv6 streams.
- Instructions to remove Internet Explorer 10 in Windows 8although internet explorer 10 has improved a lot compared to previous versions, it seems to be a secondary choice when users want to surf the web. if you also do not want to use and want to remove, you can refer to the instructions below of tipsmake.com.
- How to enable Internet Explorer mode on Microsoft Edgealthough the internet explorer browser has been discontinued, there are still some old websites that are not suitable for modern browsers, so users cannot open and read content.