croom new

There’s a New Internet Explorer Zero-Day Threat in Town

There’s a New Internet Explorer Zero-Day Threat in Town

Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.

This threat is called the Double Kill Internet Explorer vulnerability, and it was found by Chinese developers from a computer security company called Qihoo 360 Core Security. Unfortunately, they have been relatively quiet about what the specifics of this double-kill IE bug really are. This makes it much more difficult to address and identify, as identifying the warning signs can become nigh-impossible. After all, if you don’t know anything about the threat, how can you protect your business from it?

This threat uses Word documents to spread, leveraging a flaw in the Windows VBScript engine. When the Word document is opened, Internet Explorer is also opened in the background, triggering a download for an executable file. This vulnerability is designed to operate in the background without notifying the user in any way. The downloaded executable file will install a Trojan horse malware on the device, allowing the hacker to infiltrate the system at a later date without the user’s knowledge.

While we know what the threat is, there is still a lot more that we don’t know about it for sure. Professionals aren’t sure if all Word documents are affected, or if the threat needs Microsoft Office specifically installed on the device in order for the vulnerability to take root. No one even knows what role Internet Explorer plays in the attack either, or if the documents that initiate the attack are identifiable.

The only way to optimize your security against zero-day threats is to ensure that you keep best practices in mind at all times.

To get started thinking about how you can protect your business from an unknown threat, be sure to consider the basics. For one, you should never download a file from an unexpected sender. You might get emails from suspicious addresses claiming to be resumes, receipts, or other documents that your business might find useful. You can never know for sure if you’re putting your business in danger by downloading these files, so it’s best to err on the side of caution and bolster your defenses with enterprise-level security solutions. It’s especially important that you do this as soon as possible, as you never know what new types of threats will be made apparent on a daily basis.

To learn more about how your organization can protect its assets and ensure security, reach out to Eclipse Integrated Systems at 800-340-0505.

Tip of the Week: How to Use PowerPoint More Effici...
Tip of the Week: Working with Your Router for Bett...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, August 20 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Google Hackers Network Security Business Management Software Malware Internet Microsoft Tech Term Computer Hosted Solutions Innovation Windows 10 User Tips Backup Productivity Productivity Business Cybersecurity Apps Email Mobile Devices Managed IT Services Efficiency Windows Virtualization Browser Cybercrime Smartphone Saving Money Smartphones Hardware Disaster Recovery Small Business communications Operating System Data Recovery Data Backup VoIP Internet of Things Law Enforcement Communication Ransomware Passwords Business Continuity Android Data Security IT Support Microsoft Office Collaboration Miscellaneous Money Phishing Holiday Workplace Tips Mobility Chrome Social Media Server Network Mobile Device Management Telephone Systems Office 365 BDR Wireless IT Support Quick Tips Password Best Practice IT Services Outsourced IT Risk Management Google Drive Gadgets Social Data Cost Management Wi-Fi Employer-Employee Relationship Application Government Vulnerability Information Technology App Unsupported Software Health Update Cloud Computing Identity Theft Two-factor Authentication Hacking Upgrade Streaming Media Managed IT Politics Data Management User Error Save Money Sports Proactive IT Work/Life Balance Spam Facebook Users Windows 10 Managed Service Provider Automation Office tips Current Events Blockchain Shortcut USB Artificial Intelligence Patch Management Antivirus Alert Computers Flexibility Audit Save Time VPN Router Excel Networking Company Culture Encryption Bandwidth Social Engineering Telephony Humor History End of Support Battery Devices Television SaaS Commerce Remote Computing Computer Care Cortana Private Cloud Recovery Mobile Security HaaS iPhone Managing Stress Information Wireless Charging Google Docs Automobile Office Tech Support Fraud Meetings Gmail Personal Information Going Green Business Intelligence Data Storage Cleaning Transportation Samsung OneNote Apple Data Protection Internet Exlporer Legal Compliance The Internet of Things Analytics Maintenance eWaste Wireless Technology Search Hosted Solution Mobile Computing DDoS Managed IT Services WiFi IT Management Running Cable Employer Employee Relationship Root Cause Analysis Touchpad Windows Ink Ciminal Managed IT Service Touchscreen Cast Education Sales Hard Drive Benefits Data storage Licensing Big Data Device Security SharePoint RAM Trending Computing Plug-In Lithium-ion battery Solid State Drive Bluetooth Distributed Denial of Service Trends Settings Storage Electronic Medical Records Administrator PDF IT Solutions Worker Commute FAQ Internet Explorer Computer Accessories Augmented Reality Scalability Google Maps Project Management Cables BYOD Retail Marketing Chromebook Reporting Smart Technology Computer Fan Travel Books Microsoft Teams App store Remote Monitoring and Management Hacker Hard Disk Drive Sync Experience Workers Fax Server A.I. Instant Messaging Safety Emails Access Text Messaging Charger Threat Uninterrupted Power Supply Operating Sysytem How To Data Loss IT budget Virus Voice over Internet Protocol Point of Sale Conferencing Printing Medical IT WannaCry Tablets Spyware Teamwork G Suite Unified Threat Management Budget Analysis Keyboard Phone System Updates Movies Legislation Webinar WIndows Server 2008 PowerPoint Vendor Management Avoiding Downtime Proactive Advertising HBO Gifts Wearable Technology Google Assistant GDPR Video Games NFL Bring Your Own Device Upgrades Chromecast Identity Managed Service Adobe Music Microsoft Word Files Comparison Websites Amazon IT solutions Data Breach Connectivity Reputation Microsoft Excel Identities Credit Cards Value Scam Nanotechnology Laptop Word Edge Hybrid Cloud Consultant Virtual Reality Specifications Data Privacy Hiring/Firing iOS Applications Unified Communications Mobile Device Screen Mirroring Data Theft Virtual Assistant Windows 10s Robot Outlook Entertainment Evernote Downloads Training Black Market File Sharing Language Twitter Error Regulation Cache Relocation Remote Monitoring Emergency CrashOverride Monitors Dark Web Worker Disaster

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login