Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computer
The research team from Qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on Internet Explorer.
The research team from Qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on Internet Explorer.
A group of hackers are actively exploiting this vulnerability to control computers running Windows operating systems.
This vulnerability infects Office documents containing malware downloaded from IE. Malware will infiltrate and control the "User Accounts" section of the operating system, and jump on pop-ups that cause the device to be paralyzed.
According to experts, this group of hackers are also "hard at work on their own" because very few people now use IE (only 17.55%, even lower than this number) and users also. Very wary when opening unidentified Office files.
Still, researchers are calling on Microsoft to release an emergency patch to fix the flaw, as a small number of people remain loyal to the browser, especially organizations, The agency still selects IE as the default browser on its system.
See more:
- Warning: Detecting more than 1000 Cisco router and switch devices in Vietnam has a serious security error
- Only charging the battery through a computer, your iPhone may also be hacked
- Facebook awards 1 billion VND for those who find new data holes
- Hackers attack the casino through a hole in the smart thermometer of the aquarium
You should read it
- IE will have an important update next week
- How to Completely Uninstall Internet Explorer
- Microsoft has not patched security issues in IE8 for 7 months
- The 7 most common problems in Internet Explorer
- Ways to uninstall Internet Explorer 8 on Windows XP / Vista / 7
- Internet Explorer has vulnerabilities, unused users are still hacked
- Detecting vulnerabilities in BitTorrent applications allows hackers to control user computers
- Instructions to remove Internet Explorer 10 in Windows 8
- How to enable Internet Explorer mode on Microsoft Edge
- Microsoft released a serious patch in IE9 and Windows
- Security for Microsoft Internet Explorer
- 10 interesting features on Internet Explorer 10
Maybe you are interested
What is PetitPotam Attack? How to overcome PetitPotam attack The Microsoft MSERT tool can find web shells related to the Exchange Server attack campaign Many encrypted SSDs can be decoded without a password Wsreset tool of Windows 10 Store was used by hackers to bypass anti-virus software The CredSSP vulnerability in the RDP protocol affects all versions of Windows Detects two serious vulnerabilities on uTorrent that can help hackers execute malicious code or view download history on your computer