Internet Explorer Security Vulnerability for Versions 6, 7, and 8

Microsoft announced on its blog on December 29, 2012, that there was a security vulnerability with Internet Explorer 8 that could allow remote code to be executed by computers using IE 8 if a website with malicious code installed is visited.  The Los Angeles Times reported that the website for Washington, DC, based think tank Council on Foreign Relations had the malicious code on its site as early as December 21st and was infecting all affected computers that visited the site since that time.

The security advisory referenced in the blog post is #2794220.  That advisory indicates that IE 6 and IE 7 are also vulnerable to these attacks, but versions 9 and 10 are not because they do not contain the same lines of code that created the vulnerability.  However, neither of these version are an option for those using Windows XP.

On December 31, 2012, Microsoft posted two Microsoft “Fix it” patches.  The page contains information on how to install these patches on computers running one of the affected versions of Internet Explorer.

If you are using Internet Explorer versions 6, 7, or 8, you need to install the patches provided to block the security vulnerability if you cannot upgrade to IE 9 or 10 (not an option for Windows XP users).  You can determine which version of Internet Explorer you are using by clicking on the “Help” menu or Help icon and select “About Internet  Explorer.”

Links:

 

 

Rick W. Burkett runs the John A. Logan College Teaching and Learning Center, teaches history, and heads an educational nonprofit. He publishes blogs on a wide variety of topics, including history, teaching and learning, student success, and teaching online.

Please follow and like us:

WAPO: Six big cyber security predictions for 2013

The Washington Post has a technology piece which list 6 predictions for cyber security in 2013.  The list includes:

  1. Criminals will enter your Home using Smart TVs
  2. Virtual Kidnapping of Cellphones
  3. Attacks Using Bloggers Will INcrease
  4. Virtual Attacks End in Human Death
  5. Rogue Regimes use Cyber Terrorism to Attack their Governments
  6. Attacks will follow Natural Disasters

Source.

 

Rick W. Burkett runs the John A. Logan College Teaching and Learning Center, teaches history, and heads an educational nonprofit. He publishes blogs on a wide variety of topics, including history, teaching and learning, student success, and teaching online.

Please follow and like us: