Summary: These vulnerabilities affect: All current versions of Internet Explorer How an attacker exploits it: By enticing one of your users to visit a web page containing malicious content Impact: Various, in the worst case an attacker can execute code on your user's computer, potentially gaining complete control of it What to do: Deploy the appropriate Internet Explorer … [Read more...]
Latest IE Patch Corrects 26 Vulnerabilities
Summary: These vulnerabilities affect: All current versions of Internet Explorer How an attacker exploits it: By enticing one of your users to visit a web page containing malicious content Impact: Various, in the worst case an attacker can execute code on your user's computer, potentially gaining complete control of it What to do: Deploy the appropriate Internet Explorer … [Read more...]
IE Update Fixes Remote Code Execution and Certificate Issues
Summary: This vulnerability affects: All current versions of Internet Explorer How an attacker exploits it: Mostly by enticing one of your users to visit a web page containing malicious content Impact: Various, in the worst case an attacker can execute code on your user's computer, potentially gaining complete control of it What to do: Deploy the appropriate Internet … [Read more...]
Humongous IE Patch Fixes 59 Security Issues
Summary: This vulnerability affects: All current versions of Internet Explorer How an attacker exploits it: Mostly by enticing one of your users to visit a web page containing malicious content Impact: Various, in the worst case an attacker can execute code on your user's computer, potentially gaining complete control of it What to do: Deploy the appropriate Internet … [Read more...]
May's IE Update Corrects Two New Memory Corruptions
Summary: This vulnerability affects: All current versions of Internet Explorer How an attacker exploits it: By enticing one of your users to visit a web page containing malicious content Impact: Various, in the worst case an attacker can execute code on your user's computer, potentially gaining complete control of it What to do: Deploy the appropriate Internet Explorer … [Read more...]