Skip to content

Unexplainable.net

Watching The World Change

  • When Predictions Go Very Wrong Information and Theories
  • Introducing Queen Boudicca Ancient Civilizations
  • Egyptian Pyramids and Orion Corelation Theory Information and Theories
  • Ancient Roman Views on Conception Ancient Civilizations
  • Green Aliens Are In Greece! UFOs and Aliens
  • DARPA Funds Electrical Firefighting Beam Technology Articles
  • A Different Perspective on Alternative 3 Information and Theories
  • New Robot Next Step Toward Sentience Technology Articles

Germany Finds More Malicious Code In Internet Explorer

Posted on September 21, 2012 By jim No Comments on Germany Finds More Malicious Code In Internet Explorer

The German government urged the public on Tuesday to temporarily stop using Microsoft Corp’s Internet Explorer following discovery of a yet-to-be repaired bug in the Web browser that the software maker said makes PCs vulnerable hacker attacks.

It issued the warning as a researcher said he found evidence that suggests the hackers who exploited the flaw were seeking to attack defense contractors.

Microsoft said on Monday that attackers can exploit the bug in its Internet Explorer, used on hundreds of millions of computers, to infect the PC of somebody who visits a malicious website and then take control of the victim’s computer.

The German government’s Federal Office for Information Security, or BSI, said it was aware of targeted attacks and that all that was needed was to lure Web surfers to a website where hackers had planted malicious software that exploited the bug.

“A fast spreading of the code has to be feared,” the German government said in its statement.

BSI advised all users of Internet Explorer to use an alternative browser until the manufacturer has released a security update.

Officials with Microsoft did not respond to a request to comment on the move by the German government, although the company downplayed the impact of the flaw in a written statement.

“There have been an extremely limited number of attacks,” said company spokeswoman Yunsun Wee. “The vast majority of Internet Explorer users have not been impacted.”

The company said it planned to release software to protect PCs from attack within the next few days. Customers must manually install the code by visiting Microsoft’s website and clicking on a link.

Microsoft did not say how long it will take to release a full update to Internet Explorer, which will automatically be loaded onto the machines of most customers. Several security researchers have said they expect the update within a week.

The vulnerability in Internet Explorer was identified on Friday after the PC of a security researcher from Luxembourg was infected while analyzing a computer server that was used last year to launch a cyber industrial espionage campaign on at least 48 chemical and defense companies.

The victims of the so-called “Nitro” attacks included Fortune 100 corporations that develop compounds and advanced materials, according to security software maker Symantec Corp, which disclosed them in October 2011.

Network security firm AlienVault said on Tuesday it has discovered three other servers that host malicious websites that exploit the newly found Internet Explorer vulnerability.

Jaime Blasco, manager of AlienVault Labs, said he found evidence suggesting they targeted defense contractors. As an example, he said he found a related virus on a site that provides news on India’s defense sector.

“It seems that these guys are behind big targets,” he said.

Internet Explorer was the world’s second-most widely used browser last month, with about 33 percent market share, according to StatCounter. It was close behind Chrome, which had 34 percent of the market.

Until the new software is available from Microsoft, the company advises customers to use a free security tool, which is known as the Enhanced Mitigation Experience Toolkit, or EMET, to mitigate the risk of attacks. It is available through an advisory on Microsoft’s website: http://blogs.technet.com/b/msrc/

The EMET software must be downloaded, installed and then manually configured to protect computers from the newly discovered threat, according to the posting from Microsoft. The company also advised customers to adjust several Windows security settings to thwart potential attackers, but cautioned that doing so might impact the PC’s usability.

Some security experts have said it would be too cumbersome for many PC users to implement the measures suggested by Microsoft. Instead they advised Windows users to temporarily switch from Internet Explorer to rival browsers such as Google Inc’s Chrome, Mozilla’s Firefox or Opera Software ASA’s Opera.

Source: CNBC

Technology Articles

Post navigation

Previous Post: US Homeland Security Preparing for Riots, Buys Billions of Bullets
Next Post: Deparment of Homeland Security Develops Anti-Terrorism App So YOU Can “Help Protect The State”

Related Posts

  • New Technologies For New Space Missions Technology Articles
  • Professor Suggests 50 Years from AI – Immortality Around the Corner? Technology Articles
  • Cold fusion – The Salvage from the Energy Crisis? Technology Articles
  • Cell Therapy Could One Day Help Cure Aging Technology Articles
  • Magnetism and its Effects on the Living System Technology Articles
  • Nevada Prepares Laws and Roads for 2012 Auto Robots Technology Articles

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • The Meat Eater couple arrested for child abuse
  • The Meat-Eater boxer kidnapped and raped a young school Girl
  • Carnist man arrested for 198 years for raping and shooting a woman
  • Mitch McConnell- Eating Cow Corpses
  • Animal Flesh Eater Arrested: Felony Charges Serious Injury To 3 Month Old!

Recent Comments

No comments to show.

Archives

  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • May 2020
  • June 2018
  • February 2018
  • July 2016
  • May 2016
  • February 2016
  • September 2015
  • July 2015
  • May 2015
  • April 2015
  • March 2015
  • January 2015
  • December 2014
  • November 2014
  • July 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003

Categories

  • Ancient Civilizations
  • Benjamin Fulford Story
  • Corrupt Carnivores
  • Cryptology and Monsters
  • Eating Healthy
  • Ghost And Demons
  • Information and Theories
  • Mars Coverage
  • Meditation And Spirituality
  • Mysteries
  • NASA Articles
  • Other Exciting News
  • Personal Accounts
  • Pictures And Multimedia
  • Political Conspiracies
  • Recent Submissions
  • Religion Articles
  • Self Improvement
  • Simply Unexplainable
  • Space and Astrology
  • Technology Articles
  • True Stories
  • UFOs and Aliens
  • Unexplainable Video Library
  • Unexplainable Weather
  • Alien Body “Aleshenka” Found In Ural region in Russia UFOs and Aliens
  • Medieval Castles in Germany Information and Theories
  • The Hinduism, Buddhism Belief of reincarnation leads to liberation Information and Theories
  • Alien Video – Alien Autopsy Video Clip2 Unexplainable Video Library
  • DC UFO Hits Boston UFOs and Aliens
  • The Mothman at Chernobyl Simply Unexplainable
  • Eliminate Gravity Waves by Filtering Information and Theories
  • Common Buddhist Religion Terms 3 Religion Articles

Copyright © 2023 Unexplainable.net.

Powered by PressBook News Dark theme