NormCameron
Vista Guru
Ed Bott says :-
"The virus came unexpectedly. I thought my defenses were good enough, but clearly I was unprepared. This virus has proved to be unusually tenacious. I can't seem to clear it out. As soon as I see progress, the bug reemerges and attacks my system. If only Microsoft's Security Response Center could help me.
The point: Exploits happen. Merry Christmas and be glad it's not Happy New Year. Security exploits or attacks are now commonplace during the holidays. Somebody should be grateful that Microsoft got to this one early. If this is the only big security problem during the holidays, your IT organization got off easy.
Still, for many IT organizations and even consumers, today's out-of-band Internet Explorer patch is late enough to be trouble. Who wants to be distributing patches during the annual holiday party (assuming your company has one and it's no wake for those employees surviving layoffs)? For some consumers, that patch didn't come soon enough; they've been exploited already.
Because of my bodily virus, I sat out the real-time reporting and commentary around Microsoft Security Advisory 961051. In catching up, I'm surprised at the lashing Internet Explorer is taking here. Yesterday's Guardian story capped many calls for people to dump IE for another browser. Last week, Washington Post security blogger Brian Krebs advised "Windows users to consider browsing the Web with anything other than Internet Explorer."
Unfortunately, that would be my advice, too. Make a strategic retreat. I'm not suggesting that everybody dump Internet Explorer. Today, it's IE, but tomorrow the trouble could be with Firefox or Safari. No browser is truly safe.
When the hurricane or typhoon comes, you abandon your home for shelter. You flee for safety. You seek temporary shelter. That shelter is any browser but Internet Explorer. When the storm passes, most people will choose to return to their homes, i.e., IE (don't you just love the English language). Others will move away seeking safety elsewhere (other browsers).
There will be some feisty old coots who won't listen. They'll follow Microsoft's makeshift precautions and weather the storm. But that shouldn't be you. There is simply too much risk, and even Microsoft is candid about it. The risk will continue, until the patch is proven effective.
The problem is simple: This IE security hole is being rapidly exploited and from mainstream Websites. When people go to safe Internet neighborhoods and get robbed, the problem is a big one. Many of the sites fostering or propagating exploits to more mainstream operations have domains from China.
On Saturday, Microsoft warned in a blog post:
Based on our stats, since the vulnerability has gone public, roughly 0.2 percent of users worldwide may have been exposed to Websites containing exploits of this latest vulnerability. That percentage may seem low, however it still means that a significant number of users have been affected. The trend for now is going upwards: we saw an increase of over 50 percent in the number of reports today compared to yesterday.
Breadth doesn't mean depth. Just because there are more exploited sites, and they're more mainstream, doesn't mean that infections will increase. Unfortunately, they can in this case because of the ease of exploitation.
Here's the problem, straight from Microsoft's security advisory:
An attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site. The attacker could also take advantage of compromised Web sites and Web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit this vulnerability.
Meaning: The site just needs to have a script capable of exploiting how Internet Explorer handles DHTML Data Bindings. All versions, including IE 8 Beta 2, are susceptible to exploit.
"An attacker who successfully exploited this vulnerability could gain the same user rights as the local user," according to Microsoft's security advisory. The majority of users run Windows XP, which by default grants administrative privileges. Early exploits seek to steal passwords and other credentials.
Yes, this is a nasty bug. Microsoft expects to start releasing the patch around 1 p.m. ET today. But don't just patch. Switch to Firefox or another browser for a few days. You don't want this kind of security problem, where someone walks through your home's locked doors and steals some of your belongs without you knowing, during the holidays.
Other people have called for wholesale switching to anything other than IE and permanently. They're calls have had little impact. Early this morning, I looked over Net Applications' raw browser share numbers for December. There's no appreciable decline for IE. I'd be surprised if IE usage noticeably dropped because of this exploit.
Microsoft's response is reassuring. Take the patch be happy. If not for Microsoft's surprisingly quick action, your holiday stocking could have been full of coal."
IE Patch Beats Coal In Your Stocking - KezNews.com
Despite the fact that Firfox is not without it's own vulnerabilities, it is 100% safer than IE and the recommendation to switch to Firefox with No-Script remains the same.
"The virus came unexpectedly. I thought my defenses were good enough, but clearly I was unprepared. This virus has proved to be unusually tenacious. I can't seem to clear it out. As soon as I see progress, the bug reemerges and attacks my system. If only Microsoft's Security Response Center could help me.
The point: Exploits happen. Merry Christmas and be glad it's not Happy New Year. Security exploits or attacks are now commonplace during the holidays. Somebody should be grateful that Microsoft got to this one early. If this is the only big security problem during the holidays, your IT organization got off easy.
Still, for many IT organizations and even consumers, today's out-of-band Internet Explorer patch is late enough to be trouble. Who wants to be distributing patches during the annual holiday party (assuming your company has one and it's no wake for those employees surviving layoffs)? For some consumers, that patch didn't come soon enough; they've been exploited already.
Because of my bodily virus, I sat out the real-time reporting and commentary around Microsoft Security Advisory 961051. In catching up, I'm surprised at the lashing Internet Explorer is taking here. Yesterday's Guardian story capped many calls for people to dump IE for another browser. Last week, Washington Post security blogger Brian Krebs advised "Windows users to consider browsing the Web with anything other than Internet Explorer."
Unfortunately, that would be my advice, too. Make a strategic retreat. I'm not suggesting that everybody dump Internet Explorer. Today, it's IE, but tomorrow the trouble could be with Firefox or Safari. No browser is truly safe.
When the hurricane or typhoon comes, you abandon your home for shelter. You flee for safety. You seek temporary shelter. That shelter is any browser but Internet Explorer. When the storm passes, most people will choose to return to their homes, i.e., IE (don't you just love the English language). Others will move away seeking safety elsewhere (other browsers).
There will be some feisty old coots who won't listen. They'll follow Microsoft's makeshift precautions and weather the storm. But that shouldn't be you. There is simply too much risk, and even Microsoft is candid about it. The risk will continue, until the patch is proven effective.
The problem is simple: This IE security hole is being rapidly exploited and from mainstream Websites. When people go to safe Internet neighborhoods and get robbed, the problem is a big one. Many of the sites fostering or propagating exploits to more mainstream operations have domains from China.
On Saturday, Microsoft warned in a blog post:
Based on our stats, since the vulnerability has gone public, roughly 0.2 percent of users worldwide may have been exposed to Websites containing exploits of this latest vulnerability. That percentage may seem low, however it still means that a significant number of users have been affected. The trend for now is going upwards: we saw an increase of over 50 percent in the number of reports today compared to yesterday.
Breadth doesn't mean depth. Just because there are more exploited sites, and they're more mainstream, doesn't mean that infections will increase. Unfortunately, they can in this case because of the ease of exploitation.
Here's the problem, straight from Microsoft's security advisory:
An attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site. The attacker could also take advantage of compromised Web sites and Web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit this vulnerability.
Meaning: The site just needs to have a script capable of exploiting how Internet Explorer handles DHTML Data Bindings. All versions, including IE 8 Beta 2, are susceptible to exploit.
"An attacker who successfully exploited this vulnerability could gain the same user rights as the local user," according to Microsoft's security advisory. The majority of users run Windows XP, which by default grants administrative privileges. Early exploits seek to steal passwords and other credentials.
Yes, this is a nasty bug. Microsoft expects to start releasing the patch around 1 p.m. ET today. But don't just patch. Switch to Firefox or another browser for a few days. You don't want this kind of security problem, where someone walks through your home's locked doors and steals some of your belongs without you knowing, during the holidays.
Other people have called for wholesale switching to anything other than IE and permanently. They're calls have had little impact. Early this morning, I looked over Net Applications' raw browser share numbers for December. There's no appreciable decline for IE. I'd be surprised if IE usage noticeably dropped because of this exploit.
Microsoft's response is reassuring. Take the patch be happy. If not for Microsoft's surprisingly quick action, your holiday stocking could have been full of coal."
IE Patch Beats Coal In Your Stocking - KezNews.com
Despite the fact that Firfox is not without it's own vulnerabilities, it is 100% safer than IE and the recommendation to switch to Firefox with No-Script remains the same.
My Computer
System One
-
- Manufacturer/Model
- Scratch Built
- CPU
- Intel Quad Core 6600
- Motherboard
- Asus P5B
- Memory
- 4096 MB Xtreme-Dark 800mhz
- Graphics card(s)
- Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
- Monitor(s) Displays
- Samsung 206BW
- Screen Resolution
- 1680 X 1024
- Hard Drives
- 4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
- PSU
- 550 w
- Case
- Thermaltake
- Cooling
- 3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
- Mouse
- Targus
- Keyboard
- Microsoft
- Internet Speed
- 1500kbs
- Other Info
- Self built.