Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

5/25/2010
12:40 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

IE 6 Accounts For More Than One-Fourth Of All Enterprise Web Traffic

But use of the aged and vulnerable version of Internet Explorer gradually declining, report says

The aging and oft-targeted Internet Explorer 6 browser remains surprisingly prolific in enterprises, while Google services are the main conduit for malware, according to a new report on the state of Internet security.

The Zscaler report found IE 6 usage starting to decline in the first quarter of this year, however, from 33.46 percent of all Web traffic in January to 31.5 percent in February to 26.93 percent in March.

"Microsoft is still supporting IE 5 because there is such a large number of users using it. This is a dilemma for Microsoft," says Mike Geide, senior researcher for Zscaler, which released the "State of the Web Q1 2010: A View of the Web From An End User's Perspective" report today.

The recent zero-day attack in the wake of the Operation Aurora appears to have prompted many IE users to upgrade to the more secure IE 8, which wasn't affected by the Aurora bug, according to Zscaler. IE 8 adoption jumped from 5.79 percent in January to 8.65 percent in February, and then to 10 percent in March, the report says.

Overall, IE traffic accounted for about 75 percent of all Web traffic in enterprises in Q1, albeit on the decline: 76.6 percent in January, 75.26 in February, and 74.39 percent in March. "Both Firefox and Chrome appear to have benefitted somewhat from the ground lost by Microsoft, though both have a long way to go before becoming dominant placers within enterprises, as combined they only have approximately 12 percent market share," Zscaler said in its report. Meanwhile, Google search, Gmail, Blogs, and Groups were among the most blocked pages serving up malicious content, according to the report, behind ThePlanet, an infamous hosting provider associated with cybercrime. The Google services accounted for around 4,200 malicious sites installing malware on victims' machines, and ThePlanet, more than 10,600 sites.

Zscaler also found the U.S. hosts most of the good and bad/malicious Web content, with 68.11 percent of all malicious websites. Central and South America are becoming a hotbed for bad sites as well, according to the report, which can be downloaded here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10855
PUBLISHED: 2019-05-23
Computrols CBAS 18.0.0 mishandles password hashes. The approach is MD5 with a pw prefix, e.g., if the password is admin, it will calculate the MD5 hash of pwadmin and store it in a MySQL database.
CVE-2019-10866
PUBLISHED: 2019-05-23
In the Form Maker plugin before 1.13.3 for WordPress, it's possible to achieve SQL injection in the function get_labels_parameters in the file form-maker/admin/models/Submissions_fm.php with a crafted value of the /models/Submissioc parameter.
CVE-2016-7550
PUBLISHED: 2019-05-23
asterisk 13.10.0 is affected by: denial of service issues in asterisk. The impact is: cause a denial of service (remote).
CVE-2016-8897
PUBLISHED: 2019-05-23
Exponent CMS version 2.3.9 suffers from a sql injection vulnerability in framework/modules/help/controllers/helpController.php.
CVE-2016-8899
PUBLISHED: 2019-05-23
Exponent CMS version 2.3.9 suffers from a Object Injection vulnerability in framework/modules/core/controllers/expCatController.php related to change_cats.