Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Microsoft Releases 2 Critical Updates, Patches 59 IE Holes
Newest First  |  Oldest First  |  Threaded View
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
6/12/2014 | 11:51:51 AM
Re: Other Browsers
I primarily use Chrome or Firefox.  However, there are certain internal web apps which only work with IE.  As such, the only time I use IE is when I work with those web apps.
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
6/12/2014 | 10:24:32 AM
Re: Other Browsers
Also, looking back into this from an enterprise perspective. Many 3rd party vendors create web apps working natively with one browser. Whether it be IE, Chrome, Firefox, etc. I think it is important to have a secondary browser accepted within your organization with similar security lockdowns as your first browser. This way you can remain secure while staying functional.

Side note: Have you ever tried to use a webapp or console using an incompatible browser? Its a terrible experience.
Gigi3
100%
0%
Gigi3,
User Rank: Strategist
6/12/2014 | 3:55:51 AM
New patches from MS
"Two of the bulletins were categorized as critical (five as important) and three cover vulnerabilities that allow for remote code execution. In all, Microsoft patched 66 unique common vulnerabilities and exposures in Microsoft Windows, Office, Internet Explorer, Live Meeting, Lync, and Lync Server. To Microsoft's knowledge, none of the vulnerabilities are being exploited in the wild at this time. Many of the vulnerabilities patched yesterday are less important to use"

Sara, then how they identified these loop holes? Normally these loop holes are either reporting by customers after exploited by hackers or developers on pre release versions.
Randy Naramore
50%
50%
Randy Naramore,
User Rank: Ninja
6/11/2014 | 4:45:08 PM
Re: Other Browsers
I only use IE if I have to. Chrome is a good browser and most sites work well with it.
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
6/11/2014 | 3:37:59 PM
Re: Other Browsers
@RyanSepe

I absolutely agree.  As a GNU/Linux hacker, I don't touch Windows systems unless I'm at work where it's part of my job.  But I'm not the average user so my Windows caskets are always locked down pretty tight.  I do not user IE when on Windows, though.  In fact, I try to do everything I need to do online through Lynx via Cygwin, or using a locked down Firefox instance, portable install off a USB. 

Some old arguments for IE included more and more sites using Silverlight, but that has a Firefox plugin now, too, so...  I've yet to see any argument for IE that wasn't countered, and often sent users running for other browsers (excluding Microsoft-centric developers, of course, or users of web-based applications written only for IE).
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
6/11/2014 | 3:21:02 PM
Re: Big Update for Windows 8
It is an important strategy, a must to preserve Microsoft users. Sincerely I still haven't understood why Microsoft has spent so much time to release the last critical update.

Better late than never
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
6/11/2014 | 3:00:35 PM
Other Browsers
Not to by cynical, but is there any reason not to move to another browser? (Chrome or Firefox) It seems like there has been many vulnerabilities exposed for IE lately and from my experience at least with Chrome the browser is much smoother. Thoughts?
Michael Endler
100%
0%
Michael Endler,
User Rank: Apprentice
6/11/2014 | 2:20:35 PM
Big Update for Windows 8
It's worth noting that this Patch Tuesday included a bit of a strong-arm move by Microsoft: If you're running Windows 8 but not 8.1, you no longer get security updates. If you want to get updates again, you have to move to 8.1.

I sort of see where Microsoft is coming from. Windows 8.1 is substantially better than Windows 8, yet about half of the combined 8/8.1 user base is still using the original version. Given that Windows 8 still suffers from reputation problems tied to the original release, I can see why Microsoft feels compelled to move people along. That said, we'll see if the tactic comes back somehow to bite them. Whereas Apple seems to push users along without too much incident, Microsoft often seems to run into trouble.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11976
PUBLISHED: 2020-08-11
By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5
CVE-2020-13179
PUBLISHED: 2020-08-11
Broker Protocol messages in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to 20.04.1 are not cleaned up in server memory, which may allow an attacker to read confidential information from a memory dump via forcing a crashing during the single sign-on procedure.
CVE-2020-8918
PUBLISHED: 2020-08-11
An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth'...
CVE-2020-9244
PUBLISHED: 2020-08-11
HUAWEI Mate 20 versions Versions earlier than 10.1.0.160(C00E160R3P8);HUAWEI Mate 20 Pro versions Versions earlier than 10.1.0.270(C431E7R1P5),Versions earlier than 10.1.0.270(C635E3R1P5),Versions earlier than 10.1.0.273(C636E7R2P4);HUAWEI Mate 20 X versions Versions earlier than 10.1.0.160(C00E160R...
CVE-2020-9403
PUBLISHED: 2020-08-11
In PACTware before 4.1 SP6 and 5.x before 5.0.5.31, passwords are stored in a recoverable format, and may be retrieved by any user with access to the PACTware workstation.