{"id":7504,"date":"2014-04-30T13:30:48","date_gmt":"2014-04-30T17:30:48","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=7504"},"modified":"2014-04-30T13:30:48","modified_gmt":"2014-04-30T17:30:48","slug":"internet-explorer-security-bug-time-for-you-to-change-browsers","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/internet-explorer-security-bug-time-for-you-to-change-browsers\/","title":{"rendered":"Internet Explorer Security Bug: Time for You to Change Browsers"},"content":{"rendered":"<header style=\"color: #302c22;\">\n<p class=\"entry-title\" style=\"font-style: inherit;\">We&#8217;ve been advising people for at least five years to install another browser. Microsoft had a method to their madness by making IE virtually a part of Windows. That way, they figured they&#8217;d have a captive audience &#8211; and they were at least partially right.<\/p>\n<p class=\"entry-title\" style=\"font-style: inherit;\">Many of you use IE simply because you are familiar with it and you feel comfortable with it. But the time has come to get out of your comfort zone and start making some changes. By now you have to be sick of news like the latest Internet Explorer security bug. \u00a0It&#8217;s a nasty one that causes those of us &#8212; like me &#8211; who use Google Chrome (or those who chose Firefox) to yawn. Yawn! Yet Another Internet Explorer Security Hole.<\/p>\n<p class=\"entry-title\" style=\"font-style: inherit;\">It&#8217;s not a huge learning process to learn Chrome or Firefox &#8212; a couple of days using either and you&#8217;ll forget about IE and it&#8217;s trail of tears dating back over a decade. Microsoft can&#8217;t seem to do anything right these days, but it has never gotten Internet Explorer right. From the silly &#8220;Smart Screen&#8221; to the numerous serious security issue, Internet Explorer is in serious trouble this time. Even Homeland Security is telling people not to use it.<\/p>\n<p class=\"entry-title\" style=\"font-style: inherit;\">No matter whether you&#8217;re using Windows XP, Vista, Windows 7, or Windows 8x, you need to switch browsers right now. Today. And you need to get used to the fact that your old buddy IE will continue to have one serious flaw after another. It&#8217;s time you got away from IE. \u00a0You can download <strong><span style=\"text-decoration: underline;\"><a href=\"http:\/\/google.com\/chrome\/\" target=\"_blank\">Chrome here<\/a><\/span><\/strong> or <a href=\"http:\/\/goo.gl\/dev03z\" target=\"_blank\"><span style=\"text-decoration: underline;\"><strong>Firefox here<\/strong><\/span><\/a>. Do it. Don&#8217;t wait another minute. Time is ticking.<\/p>\n<blockquote>\n<h1 class=\"entry-title\" style=\"font-style: inherit;\">Internet Explorer security bug: How to stay safe<\/h1>\n<\/blockquote>\n<\/header>\n<section style=\"color: #302c22;\">\n<div class=\"entry-content\" style=\"font-weight: inherit; font-style: inherit;\">\n<div style=\"font-weight: inherit; font-style: inherit;\">\n<blockquote>\n<div class=\"story-content\" style=\"font-weight: inherit; font-style: inherit;\">\n<p style=\"font-weight: inherit; font-style: inherit;\">A vulnerability in Internet Explorer could let hackers take over your computer.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">The bug has already been used\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #990000;\" href=\"http:\/\/www.cbc.ca\/news\/technology\/internet-explorer-bug-used-by-hackers-to-attack-u-s-firms-1.2624032\">by hackers to attack<\/a>\u00a0some U.S. financial firms, cyber-security software maker FireEye\u00a0said over the weekend.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">Here&#8217;s what you need to know to protect yourself:<\/p>\n<h2 style=\"font-style: inherit;\">What versions of Internet Explorer are affected?<\/h2>\n<p style=\"font-weight: inherit; font-style: inherit;\">Internet Explorer 6 to 11 \u2013 that is, all of them. However, according to\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #990000;\" href=\"http:\/\/www.fireeye.com\/blog\/uncategorized\/2014\/04\/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html\">FireEye<\/a>, cyberattacks have been targeting Internet Explorer 9 and higher.<\/p>\n<h2 style=\"font-style: inherit;\">How does this bug allow my computer to be attacked?<\/h2>\n<div class=\"figure floatright col4width\" style=\"font-weight: inherit; font-style: inherit;\">\n<p><img decoding=\"async\" class=\"img-large\" style=\"font-weight: inherit; font-style: inherit;\" src=\"http:\/\/i.cbc.ca\/1.2625515.1398785272!\/cpImage\/httpImage\/image.jpg_gen\/derivatives\/original_300\/games-e3-microsoft.jpg\" alt=\"Games E3 Microsoft\" width=\"100%\" \/><\/p>\n<p class=\"figure-caption\" style=\"font-weight: inherit; font-style: inherit;\">A bug in Internet Explorer versions 6 to 11 makes computers vulnerable to cyberattacks that may allow criminals to take control of your computer. (Damian Dovarganes\/Associated Press)<\/p>\n<\/div>\n<p style=\"font-weight: inherit; font-style: inherit;\">If you have an affected browser and visit a booby-trapped website, the bug leaves you vulnerable to\u00a0a &#8220;drive-by install.&#8221; That means malicious software (malware) can be installed without your knowledge \u2013 you don\u2019t have to click on anything.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">Once the software is\u00a0installed, others can take control of your computer.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">Typically, Microsoft says, you&#8217;d be directed to the website by a link in an email or instant message. The email may appear to come from someone you know and the website may look like a website you normally visit.<\/p>\n<h2 style=\"font-style: inherit;\">Is there a fix?<\/h2>\n<p style=\"font-weight: inherit; font-style: inherit;\">As of Tuesday, there wasn&#8217;t. Microsoft said it is investigating, and\u00a0will &#8220;take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle-security update, depending on customer needs.&#8221;<\/p>\n<h2 style=\"font-style: inherit;\">What can I do to protect myself?<\/h2>\n<ol style=\"font-weight: inherit; font-style: inherit;\">\n<li style=\"font-weight: inherit; font-style: inherit;\"><span style=\"font-weight: bold; font-style: inherit;\">Switch to another web browser<\/span>, such as Mozilla Firefox or Google Chrome. This is one of the recommendations from\u00a0U.S. and U.K. Computer Emergency Readiness Teams from their national security agencies&#8230;<\/li>\n<\/ol>\n<\/div>\n<\/blockquote>\n<div class=\"story-content\" style=\"font-weight: inherit; font-style: inherit;\">\n<p><a href=\"http:\/\/www.cbc.ca\/news\/technology\/internet-explorer-security-bug-how-to-stay-safe-1.2625493\" target=\"_blank\"><strong>Source: CBC<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve been advising people for at least five years to install another browser. Microsoft had a method to their madness by making IE virtually a part of Windows. That way, they figured they&#8217;d have a captive audience &#8211; and they were at least partially right. Many of you use IE simply because you are familiar with it and\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/internet-explorer-security-bug-time-for-you-to-change-browsers\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1426],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7504"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=7504"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7504\/revisions"}],"predecessor-version":[{"id":7505,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7504\/revisions\/7505"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=7504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=7504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=7504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}