Syndicated Linux NewsThis forum is for the discussion of Syndicated Linux News stories.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Users of Microsoft's Internet Explorer are being urged by experts to switch to a rival until a serious security flaw has been fixed. The flaw in Microsoft's Internet Explorer could allow criminals to take control of people's computers and steal their passwords, internet experts say. Microsoft urged people to be vigilant while it investigated and prepared an emergency patch to resolve it.
SAN FRANCISCO (AFP) – Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers.
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage.
"Microsoft encourages all IE customers to test and deploy this update as soon as possible," said Microsoft security response communications head Christopher Budd.
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure "in the unprecedented time of eight days."
According to researchers at software security firm Trend Micro, attacks based on the vulnerability in the world's most popular Web browser were spreading "like wildfire" with millions of computers already compromised.
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat, according to Trend Micro.
Wow, nice way to spin a negative into a positive. You normally have to wait a entire MONTH for a bug fix from microsoft even if one is available right away, but when it's a serious security hole that opens your entire computer to hackers you only have to wait a little over a WEEK. I guess that's microsoft's definition of "service."
And what about all the people who were just busy and never heard about this security threat? They might not be patched even now, especially if they have turned of automatic spy-dates, I mean updates.
Quote:
"People should run, not walk, to get it installed," said Trend Micro advanced threat researcher Paul Ferguson. "This vulnerability is being actively exploited by cyber-criminals and getting worse every day."
People should run, not walk, to remove windoze from their computers and install Linux! They don't mention that, though.
You have to wonder why more people haven't sued microsoft for the damage caused by their security holes and shoddy, vulnerable software. If I paid for and used that crap, I would be p*ssed!
rest of story:
Quote:
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines, according to Microsoft Security Response Alliance director Mike Reavey.
Wednesday morning, business networks using IE began getting the critical fix through routine patching processes.
Reavey said Microsoft went into "emergency response" mode on December 9 after it first learned of the attacks on IE browsers.
A day later, Microsoft published a security advisory that "listed workarounds that blocked all known attacks."
"Over the course of the next eight days, this advisory was updated five times, adding newer workarounds and mitigations," Reavey said. "We also continually monitored the threat environment, noting when the attacks began to change in nature and scope."
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors' unprotected IE browsers to take advantage of the flaw.
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE's weak spot, according to Ferguson.
Hackers can take control of infected computers, steal data, redirect browsers to dubious websites, and use machines for devious activities such as attacks on other networks, according to security specialists.
In other words, we're actually ALL more vulnerable now thanks to microsoft's crappy software and poor security responses.
Quote:
"What makes this so insidious is it takes advantage of a big gaping hole of IE, which has the largest install base of any browser on the market," Ferguson said.
IE is used on nearly three-quarters of the world's computers, according to industry statistics from November.
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages.
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was "amazing" that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work.
"Even with that, the release Emergency Response process isn't over," Reavey said. "There is additional support to customers and additional refinement of our product development efforts."
Trend Micro urges IE users to heed precautionary advice from Microsoft, or avoid using the browsers, until the patches are applied.
The "exploit" is similar to one used recently to steal user names, passwords and other information from people playing online games in China, according to Trend Micro.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.