{"id":7575,"date":"2014-05-14T12:23:55","date_gmt":"2014-05-14T16:23:55","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=7575"},"modified":"2014-05-14T12:24:33","modified_gmt":"2014-05-14T16:24:33","slug":"microsoft-leaves-xp-users-exposed-to-attacks","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/microsoft-leaves-xp-users-exposed-to-attacks\/","title":{"rendered":"Microsoft Leaves XP Users Exposed  to Attacks"},"content":{"rendered":"<header style=\"color: #302c22;\">\n<blockquote>\n<h1 class=\"entry-title\" style=\"font-weight: 800; font-style: inherit;\">Microsoft sticks to vow, leaves XP exposed to ongoing attacks<\/h1>\n<h2 class=\"entry-summary\" style=\"font-weight: 400; font-style: italic;\">Refuses to patch Internet Explorer bug that hackers are already exploiting<\/h2>\n<\/blockquote>\n<\/header>\n<section style=\"color: #302c22;\">\n<div class=\"entry-content\" style=\"font-weight: inherit; font-style: inherit;\">\n<div style=\"font-weight: inherit; font-style: inherit;\">\n<div id=\"article_body\" style=\"font-weight: inherit; font-style: inherit;\">\n<blockquote>\n<p id=\"first_paragraph\" style=\"font-weight: inherit; font-style: inherit;\">Hackers are exploiting an Internet Explorer (IE) vulnerability that was left unpatched in Windows XP on Tuesday, Microsoft and outside security experts said.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">The bug, identified as CVE-2014-1815, was one of two Microsoft patched with a critical update issued Tuesday for IE6, IE7, IE8, IE9, IE10 and IE11. In the accompanying\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #990000;\" href=\"https:\/\/technet.microsoft.com\/library\/security\/ms14-029\" target=\"new\">security bulletin<\/a>, Microsoft noted that the vulnerability had been both known to hackers and used by them prior to yesterday&#8217;s update.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">&#8220;Microsoft is aware of limited attacks that attempt to exploit this vulnerability in Internet Explorer,&#8221; the bulletin stated.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">But because Windows XP exhausted its support privileges last month, users running the aged operating system did not receive the IE security update, as did owners of Windows Vista, Windows 7 and Windows 8 PCs.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">Also on Tuesday, Microsoft reasserted that it has patched its last Windows XP bug. In the\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #990000;\" href=\"http:\/\/www.computerworld.com\/s\/article\/9248317\/Microsoft_We_re_serious_this_time_XP_s_dead_to_us\">strongest signal yet<\/a>\u00a0that it will stick with its plan &#8212; and that a May 1 emergency patch for IE on XP had been a one-time deal &#8212; a company spokesman said, &#8220;The Windows XP end of support policy still remains in place moving forward.&#8221;<\/p>\n<\/blockquote>\n<h4 style=\"font-weight: inherit; font-style: inherit;\"><em><strong><a href=\"http:\/\/www.computerworld.com\/s\/article\/9248328\/Microsoft_sticks_to_vow_leaves_XP_exposed_to_ongoing_attacks\" target=\"_blank\">READ MORE AT COMPUTERWORLD<\/a><\/strong><\/em><\/h4>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft sticks to vow, leaves XP exposed to ongoing attacks Refuses to patch Internet Explorer bug that hackers are already exploiting Hackers are exploiting an Internet Explorer (IE) vulnerability that was left unpatched in Windows XP on Tuesday, Microsoft and outside security experts said. The bug, identified as CVE-2014-1815, was one of two Microsoft patched with a critical\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/microsoft-leaves-xp-users-exposed-to-attacks\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1462,1426,10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7575"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=7575"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7575\/revisions"}],"predecessor-version":[{"id":7577,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7575\/revisions\/7577"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=7575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=7575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=7575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}