kevin1341 (29-04-14),pheggie (30-04-14),raedemarkshant (29-04-14)
FireEye Research Labs identified a new Internet Explorer (IE) zero-day exploit used in targeted attacks. The vulnerability affects IE6 through IE11, but the attack is targeting IE9 through IE11. This zero-day bypasses both ASLR and DEP. Microsoft has assigned CVE-2014-1776 to the vulnerability and released security advisory to track this issue.
Microsoft same day admitted, IE 6 through 11 aren't safe:
Who is on the Internet, still running Windows XP, however, has bad cards. The new vulnerability will be the first who will no longer repaired by Microsoft for the outdated operating system Windows XP. All users running IE 6, 7 and 8 on Windows XP, are particularly at risk.
kevin1341 (29-04-14),pheggie (30-04-14),raedemarkshant (29-04-14)
Look Here -> |
Who uses IE?
kevin1341 (29-04-14),raedemarkshant (29-04-14)
IE is currently used by around 55 percent of the desktop browser market, according to , while says that 22.58 percent of people surveyed use IE.
do people still use ie?
https://www.facebook.com/philquad68
do people still use Windows online?
If I am forced to do Windows online then only through Virtual box or Parallels.
... and I am only forced at Tax Time
Update: A deletion of features that work well and ain't broke but are deemed outdated in order to add things that are up to date and broken.
Compatibility: A word soon to be deleted from our dictionaries as it is outdated.
Humans: Entities that are not only outdated but broken... AI-self-learning-update-error...terminate...terminate...
What do you mean with "Windows online"? Windows Update or surfing in the WEB, i.e. running a browser? If the latter is meant, then
1.
Today's malwares are smart enough to detect that they're being executed inside a VM and thus change their behavior - much to the aggravation of malware researchers attempting to use VMs as a way to test malware. Some time ago I read an sophisticated article about this in the WEB (malwares do it through a couple of techniques - direct hardware fingerprinting and inferred hardware fingerprinting; all such malware code indeed was published!), but can't remember the URL. BTW, a 9-year-old demo program to test whether you are running in a VM, you can get .
2.
The vulnerabilities I see running browsers in a VM are based more in the 'vmtools' portion. This is the software you install to make the guest OS run more efficiently (for VMWare this is what allows on the fly cursor capture, and sharing between guest and host without a network). This is a special software pathway for infection; don't install the tools, don't have the vulnerability.
I mean anything that connects to the web which includes a lot of apps nowadays, at least at time of install.
I don't care if the VM is fried with Malware as that particular VM will only be used to browse the web and if something appears suspicious I can revert to the original untouched image.
Virtualbox VMs are very closed off from the host if the guest additions are not installed and even if it is, something as simple as sharing a USB connection has to go through user/group permissions (I am talking about Linux).
I actually couldn't even get direct file sharing to work and I don't want to.
Parallels on OS X is a different story as it is very transparent to the host. I am very careful if I have to go online there. Only to register/authorise a software maybe , but that's it.
I never used VMWare.
Last edited by Uncle Fester; 30-04-14 at 11:22 PM.
Update: A deletion of features that work well and ain't broke but are deemed outdated in order to add things that are up to date and broken.
Compatibility: A word soon to be deleted from our dictionaries as it is outdated.
Humans: Entities that are not only outdated but broken... AI-self-learning-update-error...terminate...terminate...
Despite the fact XP support officially endend April, 9, 2014, Microsoft decided to offer another patch for XP concerning the IE vulnerability described here in post #1. So XP users aren't left in the rain.
Bookmarks