Browsing tag

Internet Explorer

Google Warns of Internet Explorer Zero-Day Vulnerability Exploited by ScarCruft Hackers

An Internet Explorer zero-day vulnerability was actively exploited by a North Korean threat actor to target South Korean users by capitalizing on the recent Itaewon Halloween crowd crush to trick users into downloading malware. The discovery, reported by Google Threat Analysis Group researchers Benoît Sevens and Clément Lecigne, is the latest set of attacks perpetrated […]

Can You Download Internet Explorer On macOS?

Internet Explorer is ridiculously slow, lame and justifies the prolonged scrutiny from users over the years. But, desperate times call for desperate measures. Those are the times when you need to have Internet Explorer or Microsoft Edge downloaded on your Mac to move forward with the task at hand. This task could be trying your website […]

Nasty Internet Explorer Bug Gives Away ‘Windows Admin Rights’ To Attackers

Microsoft has issued a warning that a severe remote code execution vulnerability (CVE-2019-1367) exists in its oldest browser, Internet Explorer. Taking its severity seriously, the company has even pushed an out-of-bound emergency patch. According to the advisory, the RCE vulnerability exists in the way the Internet Explorer’s scripting engine handles memory. It could lead to […]

Microsoft Makes Internet Explorer Less Annoying With New IE Mode For Edge

You might be living in 2019, using a modern computer with state of the art software. But there are times when technology does not want you to forget the oldies. One such instance is when you’re visiting a website and it only works with Internet Explorer due to compatibility issues. So all you can do […]

Microsoft Build 2019 Event Roundup: Here Are The Biggest Announcements

Microsoft has announced a bunch of new features and services at the annual Build 2019 Developer Conference. Besides the Windows 10 operating system, which obviously remains the center of attention, other important announcements were made such as the much awaited Chromium-based Internet Explorer browser, new Windows Terminal, an online code editor, open sourcing of development kits, […]

Ex-Google Employee Admits Using YouTube To Kill Internet Explorer

Google has been long-accused of following manipulative practices to rise above all rival web browsers, and indeed it is now the most popular one out of the lot. Amidst the accusations, an ex-Google employee has admitted that Google followed such methods. Chris Zacharias, a former YouTube developer, via his blog post has suggested that Google […]

Zero-Day vulnerability in Internet Explorer is being used to steal cryptocurrency

A few days ago, a new Internet Explorer zero-day vulnerability was reported, which, if exploited, could allow an attacker to extract information from the compromised machines. Now, cybersecurity specialists from the International Institute of Cyber Security (IICS) report that malicious hackers could exploit this vulnerability to extract cryptocurrency stored on the exposed device. In the […]

Malformed .MHT File in Internet Explorer May Lead To File Theft

As Microsoft is gearing up with a new version of Microsoft Edge based-on Chromium engine, Internet Explorer, its ugly step-mother remains as part of Windows 10, and it is dragging its vulnerability towards Redmond’s latest operating system. The Proof-Of-Concept code has been released to demonstrate the XML eXternal Entity flaw in Internet Explorer 11, which […]

New Internet Explorer zero-day vulnerability would allow local file theft

Internet Explorer is not exactly the most popular search engine, and this new security incident definitively won’t help. According to cyber forensics course specialists from the International Institute of Cyber Security (IICS), new zero-day vulnerability has been discovered in this search engine that makes Windows OS computers vulnerable to file theft attacks. According to the […]

Internet Explorer Flaw Lets Hackers Steal Your Files Even If You Don’t Use It

Internet Explorer was already useless for most of us, but now it is dangerous to have the obsolete browser on your computer. A security researcher, John Page, found a new security flaw in Internet Explorer that allows hackers to steal data. Here’s the craziest part: This flaw affects your Windows PC even if you never open the browser. So just […]

Zero-day vulnerability in Microsoft Internet Explorer; update your system now

A new remote code execution flaw affects the Microsoft browser Cybersecurity experts from the International Institute of Cyber Security report that Microsoft has just launched an urgent security update to correct critical zero-day vulnerability in the Internet Explorer browser. According to reports, there is evidence that some malicious hackers have been exploiting this vulnerability in the […]

Hackers using Internet Explorer (IE) Remote Code Execution Flaw in Rig Exploit Kit to Compromise Windows PC

Hackers now using Rig Exploit Kit to exploiting the Internet Explorer (IE) remote code execution vulnerability ( CVE-2018-8174) with integrating a cryptocurrency-mining malware to mine Monero by Compromising Windows PC. This vulnerability affected Windows 7 and later versions also this powerful exploit work via Microsoft Office documents and Internet Explorer (IE). Rig Exploit Kit delivered various payload […]

Internet Explorer zero-day: browser is once again under attack

In late April, two security companies (Qihoo360 and Kaspersky) independently discovered a zero-day for Internet Explorer (CVE-2018-8174), which was used in targeted attacks for espionage purposes. This marks two years since a zero-day has been found (CVE-2016-0189 being the latest one) in the browser that won’t die, despite efforts from Microsoft to move on to the more modern […]

Root Cause of Powerful Internet Explorer (IE) Zero-day Vulnerability that Allow Attackers to Perform Remote Hacking

New Internet Explorer Zero-day remote code execution vulnerability has been discovered that allows an attacker could execute arbitrary code and take the complete control of the infected system. Once the attacker successfully exploits this zero-day vulnerability then they could take control of an affected system and if the victims logged in with administrative user rights then […]

How To Remove Internet Explorer 11 From Your Windows 10 PC?

If you’re a regular Windows user, it’s next to impossible that you haven’t heard about the web browser named Internet Explorer. In fact, chances are high almost every Windows users might have opened IE at least one in their digital lifetime because some stubborn website only supported IE. It’s a known fact that many people hated […]

Chrome, Firefox, and Opera Vulnerable to Undetectable Phishing Attack

Browsers such as Chrome, Firefox, and Opera are vulnerable to a new variation of an older attack that allows phishers to register and pass fake domains as the websites of legitimate services, such as Apple, Google, eBay, and others. Discovered by Chinese security researcher Xudong Zheng, this is a variation of a homograph attack, first […]

Why Does “JavaScript” Contain Word “Java” Even If It Has Nothing To Do With Java

Short Bytes: Why does “JavaScript” contain “Java” word in it? Well, it has nothing to do with Java. The early web browser wars between Netscape (backed by Sun Microsystems) and Microsoft influenced how JavaScript was gradually named and shaped. Java name was included as a marketing strategy to gain acceptance.  Java in Javascript has nothing to do […]

New-looking Sundown EK drops Smoke Loader, Kronos banker

As we keep a tab on exploit kits, today we are looking at some changes with Sundown EK. Nowhere near as popular as RIG EK, this exploit kit still remains a threat with exploits for Internet Explorer, Flash, and Silverlight. In early October we detected a new landing page format for Sundown EK, which followed on some previous […]