Trend Results : Internet Explorer


Blog Post Results (1-20 of 3477)

FILTER RESULTS

Bringing Your Web Application to Desktop Life with Electron

Sick of dealing with browser quirks? Or maybe one of your users just LOVES some old crappy version of Internet Explorer? Or do you have users that simply cannot avoid the temptation of an address bar that can take them on a journey to social media land?This short post

'Whisper' heard in abandoned mine creeps out the internet - CNET

An explorer documents some weird sounds deep in a mine, but you probably shouldn't trust your ears.

Ghostly Voices Caught on Tape While Exploring an Abandoned Mine!

I believe in ghosts mainly because energy never dies, but it’s hard to get behind internet videos that claim to catch real ghosts or EVPs or aliens because of how simple it is to sham your audience. In fact, one of the biggest UFO viral videos was created by one of my friends as a […]

December 2016 Stats: Windows 10 up, IE down, Edge not going anywhere

The latest usage share reports are in and they don't give Microsoft many reasons to rejoice when it comes to the company's core products Windows 10, Internet Explorer and Microsoft Edge. Windows 10 performed considerably well this month,...Show More Summary

South Korea's Online Banking System Is Stuck In 1996

South Korea’s online banking infrastructure is a mutation of its own. Desktop users can only use PCs running Internet Explorer.

Re-install Internet Explorer 11 in Windows Server 2012 R2

Arrgh! So you have been hit by a corruption somewhere in the Internet Explorer 11 (IE 11) registry or set up and want to be able to fix it.

What to expect from AWS re:Invent – and how to watch it live | #reInvent

AWS re:Invent 2016, the fifth annual Amazon Web Services’ conference, is underway in Las Vegas. The conference will explore the Internet of Things, serverless computing, databases, containers and more. SiliconANGLE will once again be at AWS re:Invent with exclusive interviews from our roving news desk, theCUBE. Show More Summary

How to Block Users from Accessing the “about:flags” Page in Microsoft Edge

In Windows 10 Microsoft dumped Internet Explorer in favor of the brand new web browser Edge. The good thing about the new browser is that it is simple, modern, very similar to Firefox and Chrome and even has support for extensions. Moreover, just like Chrome and Firefox, Edge has the “about:flags” settings page.... Show More Summary

Colibri is a browser that thinks life is better without tabs

The last time I used a web browser without tabs was well over ten years ago. It was Internet Explorer 6. Things, thankfully, have moved on since then. But it seems that nobody has told Colibri – a new browser that aims to differentiate itself from the pack by excising tabs entirely. Show More Summary

Microsoft Edge on Android and iOS?

Microsoft Edge is a web browser that is exclusively available for Microsoft's new operating system Windows 10. In fact, Edge is the default system browser on the system. While Internet Explorer is still there as well, Edge is promoted left and right while Internet Explorer is kept on mostly for legacy reasons. Show More Summary

Product Coverage and Mitigation for CVE-2014-1776 (Microsoft Internet Explorer)

On April 26, Microsoft released Security Advisory 2963983 for Microsoft Internet Explorer. In-the-wild exploitation of this vulnerability has been observed across limited, targeted attacks. The flaw is specific to a use-after-free vulnerability in VGX.DLL (memory corruption). Show More Summary

Internet Explorer Zero Day Offers Unusual Case Study

While analyzing a recent Internet Explorer zero-day vulnerability, CVE-2014-0322 (containing the Flash sample hash b9c9dab0fd30418884800afebbaba4d99f4526ef0c9a47972a20ab20fed0a06d), we noticed the exploit makes an unorthodox call to ZwProtectVirtualMemory to bypass data execution prevention. Show More Summary

Product Coverage and Mitigation for CVE-2014-0322 (Microsoft Internet Explorer)

On February 19, Microsoft released Security Advisory (2934088) for Microsoft Internet Explorer. This vulnerability was previously reported, by 3rd parties, during the 2nd week of February 2014. In-the-wild exploitation has been observed (at least) back to early January 2014. Show More Summary

New Zero-Day Attack Copies Earlier Flash Exploitation

Late on July 10, Microsoft released a blog post disclosing that they were aware of a zero-day attack in the wild. This attack exploits a previously unpatched Internet Explorer vulnerability (CVE-2013-3163). It’s interesting that the vulnerability was just patched in this month’s Patch Tuesday (July 9), which is perhaps only a coincidence. Show More Summary

‘Cookiejacking’ Poses Minimal Danger if You Keep Good Habits

“Cookiejacking,” anyone? In the last few days, a new vulnerability in Microsoft Internet Explorer has made its way through the media. Disclosed at the Hack on the Box conference by the independent researcher Rosario Valotta, this flaw takes advantage of a property of HTML5 to steal the cookies from its victim. Show More Summary

Write Once, Mobile Malware Anywhere

The Zeus (Zbot) crimeware is sold to criminals as a complete toolkit for building custom Trojans, usually to steal banking logins.  The Trojans are generally quite complex; injecting HTML into banking websites on the Internet Explorer...Show More Summary

Targeted Internet Explorer Zero-Day Attack Announced (CVE-2010-0806)

Earlier today, Microsoft released Security Advisory (981374). This advisory covers CVE-2010-0806, an unpatched vulnerability affecting Internet Explorer versions 6 and 7. This attack appears to be rather targeted at the moment, but...Show More Summary

Patch Released for Recent Microsoft Zero Day (CVE-2010-0249)

Microsoft has released Security Bulletin MS10-002, regarding Internet Explorer vulnerabilities. In addition to patching the flaw exposed by Operation Aurora, the company released patches for seven other vulnerabilities. We are awareShow More Summary

"Operation Aurora" Leading to Other Threats

Operation Aurora has received a lot of attention over the past couple of days.  To recap, Google, Adobe, and many other companies were attacked with code exploiting a zero-day vulnerability in Internet Explorer.  Since the announcement...Show More Summary

Countdown starts for SHA-1 encrypted websites as IE11 and Edge set to block connections from Valentine’s Day

In a blog post yesterday, the Microsoft Edge Team detailed an upcoming change coming to Edge and Internet Explorer. Both of the company’s browsers will start blocking access to SHA-1 encrypted sites early next year — on Valentine’s Day, to be exact. The company actually announced this change back in November 2015, and it’s finally […]

Copyright © 2015 Regator, LLC