Get ready: End-of-life for some popular versions of Internet Explorer will soon arrive just as it did for Windows XP. While it’s an easier fix than the defunct operating system, it could bring some headaches.
Today’s cyberattacks aren’t the smash-and-grab tactics used in the past. Attackers are increasingly focused on acting on good intelligence for well-planned attacks – and Microsoft’s Internet Explorer (IE) is a favorite tool.
A critical vulnerability in Adboe Flash was released yesterday. While some browsers will update automatically, others will need to be updated by IT to avoid attacks that could steal users log-in credentials.
Microsoft’s ever-confusing update policy just got a little more cloudy. If users don’t apply a recent update, they could soon find themselves locked out of Internet Explorer security patches.
On an otherwise quiet Patch Tuesday in June, Microsoft issued its single largest patch to a program ever. The update addresses 59 security issues in various versions of its flagship browser, Internet Explorer.
Generally, vendors like to keep security flaws under wraps. Once notified, they’ll work on a fix and patch it before it can make news. But it’s been seven long months since a flaw was discovered in Internet Explorer 8 – and many are wondering Microsoft will ever do anything about it.
Whatever IT pros had on their to-do lists this week, something that just came up is probably going to trump it. It has to do with the popular browser Internet Explorer.
There’s a lot of debate about which is the most secure web browser. Conventional wisdom says that Microsoft’s Internet Explorer, the most popular browser, is also the least secure because of the attention that hackers pay to it.
A new report says some conventional wisdom about browser security might be wrong, as a series of tests to choose the most secure browser delivered a result that may surprise many IT pros:
We reported earlier on a Google-sponsored study that named the search giant’s Chrome the most secure browser available. Now, other browser makers and security researchers are firing back with their own data.