Over this past weekend Microsoft has admitted a rather large bug in Internet Explorer that could potentially allow hackers to sneak malware onto your system. The problem is that hackers are able to do this without having you download a suspicious looking file. All you have to do is visit a website set up by one of these crooks and they can gain access to your computer through Internet Explorer.
While this issue will be solved in the next internet explorer patch (scheduled for May 13th I may add) it will not be solved for XP users. XP is no longer supported by Microsoft, and as a result XP users will not be receiving the patch to fix this bug. As approximately 27% of all desktops still use XP quite a few people will not be receiving the patch.
So what can be done about this? Thankfully there are a number of solutions you can easily employ to protect your computer.
1. Use a different browser – It’s that simple. The bug is with Internet Explorer, so stop using Internet Explorer. There are many good alternatives, such as Google Chrome and Mozilla Firefox that allow you to browse the web without being worried about a hacker sneaking malware onto your system. This would work perfectly, if it were not for the fact that Internet Explorer is tied into most of Microsoft’s other products such as Outlook. The only way around this is to copy links and paste them into Chrome or Firefox as opposed to simply clicking the links. This is easy to do for users on newer operating systems, but XP users may need a more permanent solution.
2. Disable Internet Explorers Flash Plug-in – The exploit currently involves using a Flash exploitation technique that loads a SWF file to corrupt process memory and direct the program’s flow to a memory location where malicious code is laid out. By disabling flash you would make the hackers unable to use this form of the exploit, which is currently the most popular. There are two downsides to this solution, the first being that the exploit does not rely on Flash to work; Flash simply makes it faster and easier for the exploit to be abused. The second being that Flash would be disabled making you unable to use any online applications that require Flash.
3. Turn off/Set to Prompt Active Scripting – This will allow the user to allow or disallow flash and ActiveX applications. To do this you need to go into Tools-Internet options-Security-Custom level-Settings for Scripting- Active Scripting. From there you can adjust active scripting, setting it to disabled which will disallow all active scripting, or prompt which will cause IE to prompt you every time active scripting will be used.
4. Install Enhanced Mitigation Experience Toolkit (EMET) – This is software that will handle the exploit entirely and is recommended by Microsoft. It requires some technical knowledge to set up however as it must be configured to internet explorer.
5. Disable VGX.dll – If you are comfortable with a command line you can enter the following lines into the command prompt.
“%SystemRoot%System32regsvr32.exe” -u
“%CommonProgramFiles%Microsoft SharedVGXvgx.dll”
This will unregister VGX.dll which can always be enabled at a later date. This was also a recommended solution suggested by Microsoft.
So yes Internet Explorer has a security issue currently, but you can protect yourself quite easily until the next patch is released. XP users who won’t receive the patch will be in a bit of a bind however, and there is only one long term permanent solution. Get rid of XP, upgrade, buy new computers and continue to receive security updates from Microsoft.
Change is difficult, but it is time.
Looking for more cybersecurity tips? Check out this blog: Phishing Awareness Tips
Cookie | Duration | Description |
---|---|---|
__cfruid | session | Cloudflare sets this cookie to identify trusted web traffic. |
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
JSESSIONID | session | The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application. |
LS_CSRF_TOKEN | session | Cloudflare sets this cookie to track users’ activities across multiple websites. It expires once the browser is closed. |
OptanonConsent | 1 year | OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
_zcsr_tmp | session | Zoho sets this cookie for the login function on the website. |
Cookie | Duration | Description |
---|---|---|
_calendly_session | 21 days | Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. |
_gaexp | 2 months 11 days 7 hours 3 minutes | Google Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_GY6RPLBZG0 | 2 years | This cookie is installed by Google Analytics. |
_gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
Cookie | Duration | Description |
---|---|---|
_opt_expid | past | Set by Google Analytics, this cookie is created when running a redirect experiment. It stores the experiment ID, the variant ID and the referrer to the page that is being redirected. |
IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
NID | 6 months | NID cookie, set by Google, is used for advertising purposes; to limit the number of times the user sees an ad, to mute unwanted ads, and to measure the effectiveness of ads. |
test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
Cookie | Duration | Description |
---|---|---|
_dc_gtm_UA-6494714-6 | 1 minute | No description |
_gaexp_rc | past | No description available. |
34f6831605 | session | No description |
383aeadb58 | session | No description available. |
663a60c55d | session | No description available. |
6e4b8efee4 | session | No description available. |
c72887300d | session | No description available. |
cookielawinfo-checkbox-tracking | 1 year | No description |
crmcsr | session | No description available. |
currentware-_zldp | 2 years | No description |
currentware-_zldt | 1 day | No description |
et_pb_ab_view_page_26104 | session | No description |
gaclientid | 1 month | No description |
gclid | 1 month | No description |
handl_ip | 1 month | No description available. |
handl_landing_page | 1 month | No description available. |
handl_original_ref | 1 month | No description available. |
handl_ref | 1 month | No description available. |
handl_ref_domain | 1 month | No description |
handl_url | 1 month | No description available. |
handl_url_base | 1 month | No description |
handlID | 1 month | No description |
HandLtestDomainName | session | No description |
HandLtestDomainNameServer | 1 day | No description |
isiframeenabled | 1 day | No description available. |
m | 2 years | No description available. |
nitroCachedPage | session | No description |
organic_source | 1 month | No description |
organic_source_str | 1 month | No description |
traffic_source | 1 month | No description available. |
uesign | 1 month | No description |
user_agent | 1 month | No description available. |
ZCAMPAIGN_CSRF_TOKEN | session | No description available. |
zld685336000000002056state | 5 minutes | No description |