Blog
home
  • Register

Data Net Blog

There’s a New Internet Explorer Zero-Day Threat in Town

There’s a New Internet Explorer Zero-Day Threat in Town

Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.

This threat is called the Double Kill Internet Explorer vulnerability, and it was found by Chinese developers from a computer security company called Qihoo 360 Core Security. Unfortunately, they have been relatively quiet about what the specifics of this double-kill IE bug really are. This makes it much more difficult to address and identify, as identifying the warning signs can become nigh-impossible. After all, if you don’t know anything about the threat, how can you protect your business from it?

This threat uses Word documents to spread, leveraging a flaw in the Windows VBScript engine. When the Word document is opened, Internet Explorer is also opened in the background, triggering a download for an executable file. This vulnerability is designed to operate in the background without notifying the user in any way. The downloaded executable file will install a Trojan horse malware on the device, allowing the hacker to infiltrate the system at a later date without the user’s knowledge.

While we know what the threat is, there is still a lot more that we don’t know about it for sure. Professionals aren’t sure if all Word documents are affected, or if the threat needs Microsoft Office specifically installed on the device in order for the vulnerability to take root. No one even knows what role Internet Explorer plays in the attack either, or if the documents that initiate the attack are identifiable.

The only way to optimize your security against zero-day threats is to ensure that you keep best practices in mind at all times.

To get started thinking about how you can protect your business from an unknown threat, be sure to consider the basics. For one, you should never download a file from an unexpected sender. You might get emails from suspicious addresses claiming to be resumes, receipts, or other documents that your business might find useful. You can never know for sure if you’re putting your business in danger by downloading these files, so it’s best to err on the side of caution and bolster your defenses with enterprise-level security solutions. It’s especially important that you do this as soon as possible, as you never know what new types of threats will be made apparent on a daily basis.

To learn more about how your organization can protect its assets and ensure security, reach out to Data Net at (760) 466-1200.

Are Your Printing Expenses Secretly Out of Control...
Tip of the Week: Working with Your Router for Bett...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, May 22, 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity Privacy User Tips Smartphones Data Microsoft Communication Tech Term Google Internet Efficiency Malware Hardware Innovation Email Cybersecurity Communications Cloud Mobile Device IT Support Android Windows 10 Business Management Network Business Passwords Hackers Software Browser Users Mobile Devices Small Business Ransomware Applications Managed IT Services Collaboration IT Services VoIp Outsourced IT Social Media Wi-Fi Workplace Tips Apps Bandwidth Hosted Solutions Cloud Computing Wireless Chrome Holiday Data recovery Backup Managed IT services Internet of Things Smartphone Data Backup Miscellaneous Employer-Employee Relationship Patch Management Saving Money Gmail Marketing Computer Access Control Blockchain Information Microsoft Office Gadgets Networking Word Password Office 365 Connectivity Virus Save Money How To Data Protection Upgrade Phishing Telephony Voice over Internet Protocol Physical Security Compliance Paperless Office Healthcare VPN Net Neutrality Excel Value BDR Data Management Data Security G Suite Scam Data Breach Mobility Cortana Business Intelligence Tech Terms Cost Management Router Remote Computing Remote Monitoring and Management Wireless Charging Computers Facebook Government Automation Managed IT Service Medical IT Office Virtual Assistant Virtualization Artificial Intelligence e-waste Customer Service SaaS Dongle Payment Content Filtering Cables Profitability Paper Managed Service Live Streaming Document Management Antivirus Wearables Server Company Culture Retail Inventory Health Tech Support Machine Learning Tactics Tablet Settings Movies Touchscreen Telephone System Laptop Backup and Disaster Recovery Chrome OS Eliminating Downtime disposal User Security GDPR instant Messaging WannaCry Mobile Security Employees Workers Ink Staff Comparison Managing Stress Remote Support IT Management Maintenance Plug-In Alert Vulnerability Certification Microsoft Office 365 Cleaning Hard Drives Tip of the week BYOD Server Management Business Technology Voice over IP Streaming Media Storage Analytics Vulnerabilities HIPAA Operating System Solid State Drive File Sharing Millennials PowerPoint Digital Websites Specifications Troubleshooting Internet Explorer Proactive IT Telecommute Knowledge Battery Unified Communications Authentication SSD Human Resources Wireless Internet Apple Downloads Dark Web Cryptocurrency Hard Drive Hard Disk Drive Sports Congratulations Reporting Safety Personal Information Conferencing Lead Generation Bring Your Own Device Update Threat Travel Data loss Training RAM Authorization Botnet Employee-Employer Relationship Amazon iPhone Database Help Desk eCommerce Trends Error Big Data Technology Tips Processors Network Attached Storage Environment Video WhatsApp Edge E-Commerce Hybrid Cloud Outlook Website Law Enforcement Telecommuting Printing Education HP Spam Security Cameras Microsoft Teams Remote Monitoring IT budget Twitter Electronic Health Records Licensing Cybercrime Business Continuity Sales Online Shopping A.I. News Time Management User Tip Spyware Disaster Recovery WiFi Printers Thank You Regulation Windows 7 Analysis Quick Tips

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123