IEKiller was created to combat the security vulnerabilities that are inside of Internet Explorer. We have found that sometimes when...
Showing results 1 to 6 of 6
Microsoft's advisory speaks of "active attacks" and follows a separate note from Google that references the IE flaw "being actively exploited in the wild for targeted attacks."
Using three different vulnerabilities and clever exploitation techniques, Irish security researcher Stephen Fewer successfully hacked into a 64-bit Windows 7 (SP1) running Internet Explorer 8 to win this year's CanSecWest hacker challenge.
Got a website that works best in a standards compliant browser? Your users may be using older versions of Internet Explorer, and not willing to change for one reason or another.
Malicious hackers are using booby-trapped Flash banner ads to hijack clipboards for use in rogue security software attacks.In the Web attacks, which target Mac, Windows and Linux users running Firefox, IE and Safari, hackers are seizing control of the machine's clipboard and using a hard-to-delete URL that points to a fake anti-virus program.
The next version of Microsoft's much criticised Internet Explorer browser is being built to resist hijacking attempts by spyware and other malicious software, according to a Microsoft developer.
It's free, with no spyware or viruses, does not open pop-ups or hijack your searches, and no personal information is required. What...
The malicious QHosts program, which infects PCs using a recent flaw in Internet Explorer, could take control of how computers look up Internet addresses.