Skip to content

Worthy enuf? Absolutely!

25-6-2004

FFlogoClick the above Picture to see all!🙂

An independent study shows that, in 2006, IE users were vulnerable to online threats 78% of the time. Firefox users? Only 2%.

“At risk” defined as publicly available exploits with no patch. Source: “Internet Explorer users Unsafe for 284 Days in 2006”
Brian Krebs, Washington Post, 1/4/2007

And currently there is still an unpatched vulnerability in Internet Explorer 8

Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability
Secunia Advisory: SA24314
Release Date: 2007-02-26
Last Update: 2009-05-12
Popularity: 51,289 views
Critical:
Less critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Unpatched
Software: Microsoft Internet Explorer 7.x
Microsoft Internet Explorer 8.x

This program was detected as patched. Hence, you have done all that you can to secure this program in accordance with the vendor’s guidelines.

Unfortunately, there are still known security problems with this program that the vendor has yet to address.

Until a solution is available from the vendor, your best options are to:
Uninstall, disable, or apply a workaround for this security threat.

Please note. It most likely won’t be enough to simply avoid using this program, as it integrates directly with your browser and may be started (and exploited) automatically by simply visiting a website.


These are my other pages regarding this very topic.. Be Secure All!

Safer Browsing Free for you

Secunia PSI now available in 42 languages

Firefox Users Are The Safest!!

No comments yet

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: