Tuesday, September 30, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
TSMC and ARM Announce 16nm FinFET Silicon with 64-bit ARM big.LITTLE Technology
Google To Unveil New Music Services
Europe Says Ireland Helped Apple Pay Less Taxes
Pioneer Develops Rearview Mirror Telematics Unit With LTE Connectivity
Intel and Mitsubishi Electric Collaborate to Create Factory Automation Systems
Belkin Announces New Thunderbolt 2 Express Dock HD for Mac and PC Computers
iPhone 6 And iPhone 6 Plus Available in China By October 17
Apple Patches Bash Vulnerability in OS X
Active Discussions
Yamaha CRW-F1UX
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
 Home > News > General Computing > First V...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, October 19, 2006
First Vulnerability Reported in IE7


The vulnerability allows malicious hackers to sneak code onto users computers, such as keylogging programs, or to monitor their activity. Because of that, it could be used in phishing scams

Less than 24 hours after the company's announcement that IE7 had been released, the browser's first vulnerability was reported by security firm Secunia.

According to the company's advisory, the flaw is rated as "less critical," because it does not allow attackers to gain control of a system. However, it does put users at risk for exposure of system and personal information, according to Secunia chief technology officer Thomas Kristensen.

"This is a vulnerability that was in IE6 which Microsoft apparently decided not to patch," he said. "It was a surprise to us to see it wasn't fixed." "Microsoft has to reconsider this one," he said. "It's not critical because it can't compromise a system, but it is still a potent way to get information off the system of an unsuspecting user."


Previous
Next
NCsoft's Lineage II Epic Collection Ships in North America        All News        Nero Updates Nero Burning Rom to v7.5.7.0
30K Clips Erased From YouTube on Japan Media Demand     General Computing News      Credit card firms block AllofMP3 payments

Get RSS feed Easy Print E-Mail this Message

Related News
Microsoft Wireless Display Adapter Connects Miracast Devices to HDTVs
Microsoft Releases New Arc Touch Bluetooth Mouse, PC Accessories
Nvidia SHIELD Tablet Gets 32GB Storage and 4G LTE
Microsoft To Hold Next-generation Windows Event
Microsoft to Buy Minecraft maker Mojang
Microsoft To Drop The Nokia Branding
Microsoft Azure Media Services Adds Live streaming, Content Protection and Indexing Services
LaCie d2 Thunderbolt 2 Features New Design and SSD Upgrade
Microsoft Launches Delve For Office 365
Microsoft Updates MSN
China Gives Microsoft Deadline To Respond To Anti-trust Probe
LaCie Ships the 48 TB Thunderbolt 2 Storage Solution

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .