While it figures out a true fix, Microsoft offered three workarounds to ward off attacks: prevent COM objects from running in Internet Explorer; change settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and local intranet security zone; and set Internet and local intranet security zone settings to ?High? to prompt before running ActiveX Controls and Active Scripting.
1 min read
- Secure the Keys to Your Kingdom: Unveiling New Data on Global Attack Surface Threats
- What Every Enterprise Should Know About Insider Data Leaks
- Building and Maintaining an Effective Remote Access Strategy
- How Ransomware Works - And What You Can Do to Stop It
- Building and Maintaining Security at the Network Edge