Follow on Google News News By Tag * Computer * Computer Security * Web Browsers * Internet Explorer * Cookies * Cookie Jacking * MICROSOFT * Data Security * More Tags... Industry News News By Location Country(s) Industry News
Follow on Google News | Internet Explorer Loophole Let The Cookie Jacking Monster InWhat has a broad user base, tons of glitches and lets hackers have access to your personal information? Internet Explorer. Maybe the real question is, why use a browser that puts your system and information at risk?
By: Real-Time Information Services This particular flaw is found in any version of Internet Explorer used in any version of Windows. Clever hackers have found a way to turn a seemingly harmless action into a gateway to your personal information. Hackers are currently able to gain access to users cookies from any website when the system user initiates the drag and drop action. Often times this action is instigated through some devious and fraudulent technique disquised as a legitimate advertisement or query targeted at gaining your personal information. An Independent researcher, Rosario Valotta, demonstrated proof of "cookiejacking" Microsoft has stated that this type of hack is "low risk" and urges users to be more vigilant about the sites they visit and apparently turning on the "private browsing feature" prevents access to the cookie files saved on disk and in active session memory. Microsoft believes that people will not be easily duped into performing a task that allows entry. I think this is an underestimation on how clever hack schemes can be as well as the common users ability to identify a ploy. Moreover, I'm just plain tired of bugs, patches, fixes and flaws for a such a widely used web browser. With competition ranging from Google Chrome to Firefox, I'm surprised at how many people stay loyal to Internet Explorer. Any of these browsers allow hassle free searching presented in a clear manner and without all the problems or security risks. With the large amount of business done online today companies and individuals can't afford to be nonchalant about their computer security no matter how "low risk" the threat is. As Microsoft says, If it's easy enough to avoid risky sites, then by applying the same logic, it's easy enough to avoid risky browsers such as Exploder. It only takes one successful attack to put your company and personal information at risk. As a rule any Business should look into hiring certified computer network techs or an IT support company for additional security support. If you have any concerns as to whether your system or network has been put at risk you should consult a computer repair or support specialist. As with any line of defense the best protection is prevention. http://www.realtimeca.com http://www.realtimeca.com/ # # # Real-Time Information Services is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability.With Computer Networking that better maps to your business, you’ll never have to worry about technology again. Our experienced professionals are your partners in Computer Repair, so your business can simplify its everyday processes and increase efficiency in Fresno. End
Account Email Address Account Phone Number Disclaimer Report Abuse
|
|