- Apr 9, 2013
- 4,470
- 0
- 0
http://www.ft.com/cms/s/0/789b2c0e-ce2b-11e3-bc28-00144feabdc0.html#axzz307WkMU3i
Sigh.:'( Is there any end to this stuff????
Where is the MS PATCH?????
The flaw was just disclosed a couple of days ago. Did you expect them to have a patch ready for a flaw they didn't know about? Sheesh.
My take is holes in all MS OSes & browsers are inevitable, ongoing and infinite, and to be expected. But my take, is this one is ESPECIALLY BAD.
Major wire services/major periodicals do not report holes in IE or MS OSes as a matter of COURSE.
PLUS, this is only the latest in a recent, ATYPICAL chronology.
Do I expect better?
YES. I DO.
And the browser that holds the record for serious security flaws is Firefox not IE.
And yes security flaws like this one are indeed reported in the major media on a regular basis.
btw, what in the world is an 'atypical chronology'? A time line of untypical events? What the heck?
Forgive me, I find your take on this wanting in both specifics and perspective.
Atypical not so different from untypical. I almost always choose the former, and so do most in my circles, including professional circles.
Naturally, I include the Heartbleed mess. And, u bet, all this is comprising an ATYPICAL CHRONOLOGY.....and, an objectively rattling one.
If you don't agree, that's your choice.
And if so, you and I live in different realities. Use the last update link I put up. And, if you still think this is business as usual.....you just continue to invest in that cavalierly.
you know that during the last Pwn2own browser hacking contest every browser has been hacked several times, right?
even ChromeOS was pwned twice.
the only target that has not been pwned despite the highest reward ($150 000) was... IE11 with EMET.
this tends to prove that MS knows how to build a secure browser with the latest memory protection techniques. However, due to the risk of breaking some plugins used by big enterprise customers, Microsoft refrains from shipping the technologies provided by EMET directly via windows update.
but if you are computer literate, you have no excuse not to use EMET (even if you don't use IE).
some (easy to understand) information about EMET:
http://www.julien-manici.com/blog/EMET-protection-against-flaws-Internet-Explorer-Firefox-Chrome/
also, Win8.x users can enable Enhanced Protected Mode, the newest IE sandbox which breaks the exploit currently in the wild (even if EMET is not installed).
EPM is enabled by default in IE/Metro, but not in IE/Desktop.
http://www.julien-manici.com/blog/ie10-new-sandbox-enhanced-protected-mode-windows-8/
also note that IE Mobile on WP is not vulnerable, since VML is a deprecated component which doesn't ship in WP7/8.
PCs running Windows XP will not receive any updates fixing that bug when they are released
Security firms estimate that between 15 and 25 percent of the world's PCs still run Windows XP
A little surprised that more people don't know more about this, especially on AT, & I've been using the enhanced protected mode since I saw it being the default option put in place for server 2008 R2. Now I have not delved into the details, since they aren't shared publicly, of it but as the name suggests EPM should save you from a bunch of potentially fatal (security) flaws in IE & windows plus EMET will make it even more secure but yeah anything older than IE9 should be dumped asap !you know that during the last Pwn2own browser hacking contest every browser has been hacked several times, right?
even ChromeOS was pwned twice.
the only target that has not been pwned despite the highest reward ($150 000) was... IE11 with EMET.
this tends to prove that MS knows how to build a secure browser with the latest memory protection techniques. However, due to the risk of breaking some plugins used by big enterprise customers, Microsoft refrains from shipping the technologies provided by EMET directly via windows update.
but if you are computer literate, you have no excuse not to use EMET (even if you don't use IE).
some (easy to understand) information about EMET:
http://www.julien-manici.com/blog/EM...irefox-Chrome/
also, Win8.x users can enable Enhanced Protected Mode, the newest IE sandbox which breaks the exploit currently in the wild (even if EMET is not installed).
EPM is enabled by default in IE/Metro, but not in IE/Desktop.
http://www.julien-manici.com/blog/ie...ode-windows-8/
also note that IE Mobile on WP is not vulnerable, since VML is a deprecated component which doesn't ship in WP7/8.
Firefox insecurity info:
http://www.extremetech.com/computin...er-falls-to-four-zero-day-exploits-at-pwn2own
http://www.pcworld.com/article/2029...efox-take-25-year-lead-in-security-flaws.html
Heartbleed has nothing to do with MS it was related to OpenSSL.
I expect more of this will come, as hackers now know that those older versions of IE that are running on XP will not be able to block any fix Microsoft releases from now on.
Glad I don't use IE, and glad I finally got my parents and some good friends off XP.
These were patched by FF and I do think FF patches crap quicker than IE.
Newer version of Adobe Flash released to mitigate this threat.
https://isc.sans.edu/forums/diary/IE+Zero+Day+Advisory+from+Microsoft/18035
Firefox insecurity info:
http://www.extremetech.com/computin...er-falls-to-four-zero-day-exploits-at-pwn2own
http://www.pcworld.com/article/2029...efox-take-25-year-lead-in-security-flaws.html
Heartbleed has nothing to do with MS it was related to OpenSSL.
OP Just wanted to say thanks for bringing this up & links. I removed flash plugin for IE (Shockwave) and You Tube Videos seem to play fine. Also thanks to R0H1t for the info about EPM. (Win 7 SP1 / IE11)
BESIDE THE POINT! And, AGAIN, obfuscating both facts and perspective.
I never said Heartbleed is related to this new, serious horror. I said, RECENT CHRONOLOGY. And yes! ATYPICAL.....in light of history.
Forgot to say THANK YOU to whoever moved this to this most esoteric and proper forum!
You're most welcome. It is truly a Security matter. Thank you for initiating it.