About Us

IT Services

Understanding IT

News & Events



Contact Us

  • Register

Texas Professional IT Services LLC Blog

There’s a New Internet Explorer Zero-Day Threat in Town

There’s a New Internet Explorer Zero-Day Threat in Town

Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.

This threat is called the Double Kill Internet Explorer vulnerability, and it was found by Chinese developers from a computer security company called Qihoo 360 Core Security. Unfortunately, they have been relatively quiet about what the specifics of this double-kill IE bug really are. This makes it much more difficult to address and identify, as identifying the warning signs can become nigh-impossible. After all, if you don’t know anything about the threat, how can you protect your business from it?

This threat uses Word documents to spread, leveraging a flaw in the Windows VBScript engine. When the Word document is opened, Internet Explorer is also opened in the background, triggering a download for an executable file. This vulnerability is designed to operate in the background without notifying the user in any way. The downloaded executable file will install a Trojan horse malware on the device, allowing the hacker to infiltrate the system at a later date without the user’s knowledge.

While we know what the threat is, there is still a lot more that we don’t know about it for sure. Professionals aren’t sure if all Word documents are affected, or if the threat needs Microsoft Office specifically installed on the device in order for the vulnerability to take root. No one even knows what role Internet Explorer plays in the attack either, or if the documents that initiate the attack are identifiable.

The only way to optimize your security against zero-day threats is to ensure that you keep best practices in mind at all times.

To get started thinking about how you can protect your business from an unknown threat, be sure to consider the basics. For one, you should never download a file from an unexpected sender. You might get emails from suspicious addresses claiming to be resumes, receipts, or other documents that your business might find useful. You can never know for sure if you’re putting your business in danger by downloading these files, so it’s best to err on the side of caution and bolster your defenses with enterprise-level security solutions. It’s especially important that you do this as soon as possible, as you never know what new types of threats will be made apparent on a daily basis.

To learn more about how your organization can protect its assets and ensure security, reach out to Texas Professional IT Services LLC at (832) 514-6260.

Are Your Printing Expenses Secretly Out of Control...
Tip of the Week: Working with Your Router for Bett...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, March 21, 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Productivity Microsoft User Tips Cybersecurity Communications Communication Google Smartphones Malware Tech Term Email Efficiency Managed IT Services Outsourced IT Data Software Hackers Backup Internet Business Hardware Passwords Android Browser Windows 10 Innovation Mobile Device Ransomware VoIp IT Services Collaboration Mobile Devices Business Management Data Backup Small Business Wi-Fi Applications Microsoft Office Smartphone Holiday Users Internet of Things Data Recovery Save Money IT Support Managed IT Services Hosted Solutions Network Cloud Computing Social Media Miscellaneous Business Intelligence Workplace Tips Apps Wireless Saving Money Access Control Patch Management Password Word Computer Business Continuity Automation Data Breach Phishing VoIP Data Management Chrome Marketing Router Analytics Employer-Employee Relationship Office Government Bandwidth Networking Blockchain Information Excel Office 365 Settings Twitter Tip of the week Alert Artificial Intelligence Battery Facebook Medical IT IT Support Virtualization Website Cortana BDR Virus Spam Scam Remote Computing Vulnerability Law Enforcement Managed Service BYOD Data Protection How To Dark Web VPN Gadgets Paperless Office Compliance Cybercrime Tech Terms App Retail G Suite Workers Physical Security Data Security Managed IT Service Virtual Assistant Connectivity Mobility Gmail Cost Management Company Culture Mobile Device Management Politics Wireless Charging Windows Remote Monitoring and Management Computers iPhone WannaCry Antivirus Streaming Media Amazon Training Tech Support User Tip Entertainment Environment Biometrics Paper Hybrid Cloud Wireless Internet Hiring/Firing Comparison Spam Blocking Troubleshooting Printer Server RAM Analysis E-Commerce Voice over IP Multi-Factor Security IT budget Tactics Touchscreen Access HIPAA Staff Downloads Security Cameras Phone System Big Data e-waste Server Machine Learning Ink Cables Help Desk Staffing Specifications Email Management Document Management Inventory SaaS Time Management Remote Support Update Printers Sales Technology Tips Microsoft Teams Information Technology Payment News Shortcut eCommerce IT Management Maintenance Microsoft Office 365 Hard Drive Websites Trends Wearables Travel Telecommuting disposal Recovery PowerPoint Voice over Internet Protocol Upgrade Conferencing Mobile Security GDPR Chrome OS Smart Technology Outlook Automobile Tablet Telephone Systems Backup and Disaster Recovery Managing Stress instant Messaging Telephone System Online Shopping Internet Explorer Authentication File Sharing Hosted Solution Processors Safety A.I. Plug-In Healthcare Education Gadget Millennials Google Drive Laptop Value Lead Generation Managed IT Telecommute Sports Certification Content Filtering Digital Operating System Storage Profitability Knowledge Hard Drives Vulnerabilities Cleaning Network Attached Storage Threat Authorization User Security Copy Spyware Movies Proactive IT Live Streaming Two-factor Authentication Apple Data loss Licensing Edge Error Remote Monitoring Server Management Printing Bring Your Own Device Eliminating Downtime Files Google Maps Remote Control SSD Reporting Cryptocurrency Botnet Disaster Recovery Business Technology Paste HP Dongle Unified Communications Personal Information WhatsApp Telephony Database Thank You Windows 7 CrashOverride WiFi Congratulations Emergency Regulation Quick Tips

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520