Read more about Internet Explorer
Bookmark and Share
  • Windows, IE, Java are most vulnerable

    04.02.2014

    When compared with the numbers from the previous year, 2013 has seen an increase in reported security vulnerabilities and, what's more, the number of critical vulnerabilities has also risen - although it's considerably smaller than in 2009.

  • IE flaw targeted in Aurora attacks still actively exploited

    17.12.2013

    Regular software patching is often touted as one of the best things you can do to keep your computer safe against malware infection.

  • Configuring for security in a world of 0-days

    16.12.2013

    Last month, Microsoft published two separate notices of 0-day vulnerabilities that were being used in the wild to attack Microsoft products.

  • Microsoft fixes 24 vulnerabilities

    10.12.2013

    This Patch Tuesday features a solid 11 advisories affecting 6 different product types.

  • New IE 0-day actively exploited by Chinese attackers

    11.11.2013

    After having discovered a new IE zero-day exploit being actively used in the wild, FireEye researchers have revealed that the watering hole attack is more than likely mounted by the same Chinese hacker group that orchestrated Operation DeputyDog and the attack on Bit9.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //