{"id":7471,"date":"2014-04-28T08:15:13","date_gmt":"2014-04-28T12:15:13","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=7471"},"modified":"2014-04-28T08:15:48","modified_gmt":"2014-04-28T12:15:48","slug":"new-internet-explorer-flaw-leaves-25-vulnerable","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/new-internet-explorer-flaw-leaves-25-vulnerable\/","title":{"rendered":"New Internet Explorer Flaw  Leaves 26% Vulnerable"},"content":{"rendered":"<header style=\"color: #302c22;\">\n<blockquote>\n<h1 class=\"entry-title\" style=\"font-weight: 800; font-style: inherit;\">A New Internet Explorer Security Flaw Leaves One Quarter Of Web Browsers Vulnerable<\/h1>\n<h2 class=\"entry-summary\" style=\"font-weight: 400; font-style: italic;\">More bad news in the world of online security. posted on April 27, 2014 at 5:12pm EDT<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"http:\/\/s3-ec.buzzfed.com\/static\/2014-04\/enhanced\/webdr02\/27\/17\/enhanced-buzz-15048-1398632853-14.jpg\" alt=\"\" width=\"625\" height=\"453\" \/><\/p><\/blockquote>\n<\/header>\n<section style=\"color: #302c22;\">\n<div class=\"entry-content\" style=\"font-weight: inherit; font-style: inherit;\">\n<div id=\"buzz_sub_buzz\" class=\"c suplist_article suplist_list_show\" style=\"font-weight: inherit; font-style: inherit;\">\n<blockquote>\n<div id=\"superlist_3201241_2850871\" class=\"buzz_superlist_item buzz_superlist_item_text  buzz_superlist_item_wide   \" style=\"font-weight: inherit; font-style: inherit;\">\n<p class=\"sub_buzz_desc\" style=\"font-weight: inherit; font-style: inherit;\">More bad news for online security, especially if you use Internet Explorer to browse the web.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">Last night, Microsoft announced that all versions of Internet Explorer have been affected by a \u201czero day\u201d security flaw (a \u201czero day\u201d flaw is a vulnerability that gives victims zero days of warning before attack) . According to the security company<a style=\"font-weight: inherit; font-style: inherit; color: #990000;\" href=\"http:\/\/www.fireeye.com\/blog\/?p=5312\">FireEye<\/a>, the flaw leaves 26.25% of the browser market vulnerable to attack. This, of course, comes just weeks after the OpenSSL flaw, Heartbleed left over two-thirds of the internet vulnerable to potential attacks.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">Here\u2019s how the web browser market share breaks down for Internet Explorer as of 2013, according to\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #990000;\" href=\"http:\/\/www.netmarketshare.com\/browser-market-share.aspx?qprid=2&amp;qpcustomd=0&amp;qpsp=168&amp;qpnp=12&amp;qptimeframe=M\">NetMarket Share<\/a>:<\/p>\n<\/div>\n<\/blockquote>\n<div id=\"superlist_3201241_2850922\" class=\"buzz_superlist_item buzz_superlist_item_text  buzz_superlist_item_wide   \" style=\"font-weight: inherit; font-style: inherit;\">\n<blockquote>\n<p class=\"sub_buzz_desc\" style=\"font-weight: inherit; font-style: inherit;\">Plainly speaking, the flaw allows attackers to corrupt and steal data after users are lured to fake websites, meaning anyone using Internet Explorer should be extra vigilant clicking suspicious links that might come through email or other spam sites.<\/p>\n<p>Here\u2019s a description of the flaw according to Microsoft\u2019s\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #990000;\" href=\"https:\/\/technet.microsoft.com\/en-US\/library\/security\/2963983\">Tech Security Center<\/a>:<\/p><\/blockquote>\n<blockquote style=\"font-weight: inherit; font-style: inherit;\">\n<p style=\"font-weight: inherit; font-style: inherit;\"><span style=\"color: #008080;\">&#8216;The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.&#8217;<\/span><\/p>\n<\/blockquote>\n<p style=\"font-weight: inherit; font-style: inherit;\"><a href=\"http:\/\/www.buzzfeed.com\/charliewarzel\/a-new-internet-explorer-security-flaw-leaves-one-quarter-of\" target=\"_blank\"><span style=\"text-decoration: underline;\"><em><strong>Source: BuzzFeed<\/strong><\/em><\/span><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>A New Internet Explorer Security Flaw Leaves One Quarter Of Web Browsers Vulnerable More bad news in the world of online security. posted on April 27, 2014 at 5:12pm EDT More bad news for online security, especially if you use Internet Explorer to browse the web. Last night, Microsoft announced that all versions of Internet Explorer have been\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/new-internet-explorer-flaw-leaves-25-vulnerable\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1426,779],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7471"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=7471"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7471\/revisions"}],"predecessor-version":[{"id":7473,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7471\/revisions\/7473"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=7471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=7471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=7471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}