croom new

There’s a New Internet Explorer Zero-Day Threat in Town

There’s a New Internet Explorer Zero-Day Threat in Town

Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.

This threat is called the Double Kill Internet Explorer vulnerability, and it was found by Chinese developers from a computer security company called Qihoo 360 Core Security. Unfortunately, they have been relatively quiet about what the specifics of this double-kill IE bug really are. This makes it much more difficult to address and identify, as identifying the warning signs can become nigh-impossible. After all, if you don’t know anything about the threat, how can you protect your business from it?

This threat uses Word documents to spread, leveraging a flaw in the Windows VBScript engine. When the Word document is opened, Internet Explorer is also opened in the background, triggering a download for an executable file. This vulnerability is designed to operate in the background without notifying the user in any way. The downloaded executable file will install a Trojan horse malware on the device, allowing the hacker to infiltrate the system at a later date without the user’s knowledge.

While we know what the threat is, there is still a lot more that we don’t know about it for sure. Professionals aren’t sure if all Word documents are affected, or if the threat needs Microsoft Office specifically installed on the device in order for the vulnerability to take root. No one even knows what role Internet Explorer plays in the attack either, or if the documents that initiate the attack are identifiable.

The only way to optimize your security against zero-day threats is to ensure that you keep best practices in mind at all times.

To get started thinking about how you can protect your business from an unknown threat, be sure to consider the basics. For one, you should never download a file from an unexpected sender. You might get emails from suspicious addresses claiming to be resumes, receipts, or other documents that your business might find useful. You can never know for sure if you’re putting your business in danger by downloading these files, so it’s best to err on the side of caution and bolster your defenses with enterprise-level security solutions. It’s especially important that you do this as soon as possible, as you never know what new types of threats will be made apparent on a daily basis.

To learn more about how your organization can protect its assets and ensure security, reach out to Eclipse Integrated Systems at 800-340-0505.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, June 19 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Business Computing Google Network Security Internet Malware Business Management Software Microsoft Computer Windows 10 Innovation User Tips Productivity Backup Hosted Solutions Productivity Business Cybersecurity Apps Mobile Devices Tech Term Email Windows Efficiency Hardware Cybercrime Smartphone Law Enforcement Saving Money Operating System Virtualization Browser Disaster Recovery Managed IT Services Data Backup IT Support VoIP Business Continuity Android Smartphones Collaboration Ransomware Internet of Things Small Business Data Security Mobility Phishing communications Data Recovery Office 365 Microsoft Office Mobile Device Management Telephone Systems Communication Wireless Chrome Quick Tips Money Miscellaneous Server Passwords Holiday Cloud Computing Workplace Tips Gadgets Password Best Practice Cost Management Wi-Fi Health Google Drive Social Media Government Social BDR Vulnerability Data Unsupported Software IT Services Application IT Support App Information Technology Risk Management Update Outsourced IT Computers Work/Life Balance Facebook Upgrade Hacking Patch Management Data Management Current Events Office tips Spam Employer-Employee Relationship Save Money USB Windows 10 Managed Service Provider Sports Artificial Intelligence Antivirus Two-factor Authentication Shortcut Identity Theft Streaming Media Politics Alert User Error Managed IT Wireless Technology Save Time Television The Internet of Things Wireless Charging Private Cloud Google Docs Blockchain Hosted Solution Commerce Fraud iPhone Data Storage HaaS Computer Care VPN Users Social Engineering Automobile Data Protection Telephony Humor Maintenance Meetings Personal Information Going Green Remote Computing Office Apple Legal Search Recovery Network Excel Cleaning eWaste Samsung OneNote Mobile Computing DDoS Automation WiFi Flexibility Devices Gmail Tech Support Mobile Security Encryption Cortana Router Managed IT Services Transportation Bandwidth Proactive IT History End of Support Battery Audit Internet Exlporer Updates Instant Messaging Connectivity Solid State Drive Legislation Websites Experience Company Culture Settings Marketing How To Value Electronic Medical Records Fax Server Text Messaging Robot Computer Accessories Augmented Reality WIndows Server 2008 NFL Point of Sale Unified Communications Smart Technology Computer Fan HBO Gifts Data Privacy Touchpad SaaS Adobe Microsoft Word Trending Managing Stress Downloads Hacker Hard Disk Drive Teamwork Comparison Data Theft Data storage Phone System Data Breach Safety Emails Microsoft Excel Identities Lithium-ion battery Unified Threat Management Word Edge Advertising Administrator RAM WannaCry Credit Cards Video Games Hard Drive Wearable Technology Applications Trends Keyboard Screen Mirroring Specifications Computing Music Outlook Evernote Reputation Internet Explorer Webinar File Sharing Language Vendor Management Upgrades Windows Ink Ciminal Access Microsoft Teams IT Management Uninterrupted Power Supply Chromebook Operating Sysytem Licensing Device Security Budget Virtual Reality A.I. Cast Sales App store Analytics Networking Black Market Threat IT solutions Storage Virus Entertainment Avoiding Downtime Consultant Google Maps Project Management G Suite Scam Nanotechnology IT Solutions FAQ Printing Running Cable Travel Chromecast Education Movies Hiring/Firing iOS BYOD Retail Big Data Mobile Device Sync Workers Files PowerPoint Windows 10s SharePoint Proactive Training Scalability Google Assistant Touchscreen Bluetooth Distributed Denial of Service Data Loss IT budget PDF Worker Commute Employer Employee Relationship Root Cause Analysis Charger Tablets Spyware Business Intelligence Benefits Conferencing Identity Laptop Books Relocation Disaster Hybrid Cloud Cache Twitter Remote Monitoring Emergency CrashOverride Monitors Worker Bring Your Own Device

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login