Internet Explorer Security Bug: Loophole for Hackers - Online Social Media

Internet Explorer Security Bug: Loophole for Hackers

Things aren’t looking to good for the reputation for one of the most used browsers, Internet Explorer. We previously reported the news back towards the end of December that users may be at risk of hackers taking over their machines.

The previous bug was allowing other people to take over your computer when unprotected. One way that we suggested avoiding this bug was by installing another browser (remember that most machines come with IE pre-loaded), you can get lots of different ones but here’s a link for Mozilla Firefox or perhaps you prefer Opera? You can also view some documentation from NSS labs on Web Browser Security and how to protect against Malware.

Internet Explorer Security Bug: Loophole for Hackers

Onto today’s bug, the warnings we have seen are from the BBC News website that again, the browser can be used by hackers in a malicious manner and hijack computers or steal personal information. If you are wondering how many people this affects, well count how many people use IE; we are looking at 900 million.

Microsoft has issued a software patch and is currently looking into developing a long-term-fix. The problem its self isn’t even with Internet explorer, it just uses it to run the malicious script, which will collate personal data from the machine.

According to Microsoft there is no evidence that the glitch had been exploited by hackers; however some of their researchers have identified the bug as a serious threat. Head over to where Steve Ragan has compiled a report on his experiences with the fix from Microsoft.

You can read everything that Microsoft are doing and saying to try to sort this over at their official site and also how the has been testing it. Finally, if you need to download the fix, you can get it from the support section of Microsoft’s website or simply by clicking here.

Have you downloaded the fix? Report back to us and let us know if you find any further problems with it in the comments section below.