About Us

IT Services

Understanding IT

News & Events



Contact Us

  • Register

Texas Professional IT Services LLC Blog

There’s a New Internet Explorer Zero-Day Threat in Town

There’s a New Internet Explorer Zero-Day Threat in Town

Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.

This threat is called the Double Kill Internet Explorer vulnerability, and it was found by Chinese developers from a computer security company called Qihoo 360 Core Security. Unfortunately, they have been relatively quiet about what the specifics of this double-kill IE bug really are. This makes it much more difficult to address and identify, as identifying the warning signs can become nigh-impossible. After all, if you don’t know anything about the threat, how can you protect your business from it?

This threat uses Word documents to spread, leveraging a flaw in the Windows VBScript engine. When the Word document is opened, Internet Explorer is also opened in the background, triggering a download for an executable file. This vulnerability is designed to operate in the background without notifying the user in any way. The downloaded executable file will install a Trojan horse malware on the device, allowing the hacker to infiltrate the system at a later date without the user’s knowledge.

While we know what the threat is, there is still a lot more that we don’t know about it for sure. Professionals aren’t sure if all Word documents are affected, or if the threat needs Microsoft Office specifically installed on the device in order for the vulnerability to take root. No one even knows what role Internet Explorer plays in the attack either, or if the documents that initiate the attack are identifiable.

The only way to optimize your security against zero-day threats is to ensure that you keep best practices in mind at all times.

To get started thinking about how you can protect your business from an unknown threat, be sure to consider the basics. For one, you should never download a file from an unexpected sender. You might get emails from suspicious addresses claiming to be resumes, receipts, or other documents that your business might find useful. You can never know for sure if you’re putting your business in danger by downloading these files, so it’s best to err on the side of caution and bolster your defenses with enterprise-level security solutions. It’s especially important that you do this as soon as possible, as you never know what new types of threats will be made apparent on a daily basis.

To learn more about how your organization can protect its assets and ensure security, reach out to Texas Professional IT Services LLC at (832) 514-6260.

Are Your Printing Expenses Secretly Out of Control...
Tip of the Week: Working with Your Router for Bett...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, August 19, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Cloud Privacy Cybersecurity Communications Managed IT Services Network Security Malware Tech Term Smartphones Microsoft Backup Communication Business Hardware Outsourced IT Software Save Money Productivity Wi-Fi Google Social Media Android Email Ransomware Hackers VoIp Hosted Solutions Business Management Data Backup Small Business Applications Microsoft Office Internet Smartphone Passwords Business Intelligence Phishing Data Breach IT Services Apps Router Mobile Devices IT Support Analytics Cloud Computing Employer-Employee Relationship Office Government Network Browser Windows 10 User Tips Saving Money Excel Innovation Settings Twitter Blockchain Efficiency Data Miscellaneous Patch Management Data Recovery Automation Computer VoIP Data Management Internet of Things Collaboration Managed IT Services Cybercrime Data Protection Compliance Chrome VPN Retail App Bandwidth Tech Terms Workers Office 365 Wireless Company Culture Physical Security Access Control Mobile Device Management Managed IT Service Politics Information Networking Windows Gmail Cost Management Tip of the week Virtual Assistant Website Wireless Charging Alert Computers IT Support Vulnerability Holiday Password Word Business Continuity Law Enforcement Spam Virtualization Artificial Intelligence Battery Virus Cortana BDR Scam Remote Computing How To Managed Service Document Management Inventory Recovery Dark Web Remote Support Server Machine Learning Ink BYOD Specifications Technology Tips Microsoft Teams Gadgets News eCommerce IT Management Maintenance Automobile Telephone Systems Sales Workplace Tips Gadget Google Drive Smart Technology Travel Telecommuting GDPR disposal Hosted Solution Hard Drive Voice over Internet Protocol Websites Trends Conferencing Paperless Office Mobile Security Managed IT Marketing PowerPoint Backup and Disaster Recovery Managing Stress Telephone System Online Shopping Internet Explorer Tablet Plug-In Two-factor Authentication Education Millennials Laptop Value Copy File Sharing Processors Safety A.I. Content Filtering Digital Operating System Lead Generation G Suite Telecommute Sports Proactive IT Hard Drives Cleaning Network Attached Storage Threat Google Maps Remote Control Remote Monitoring Knowledge Live Streaming Paste User Security Spyware Movies Disaster Recovery Licensing Reporting Edge Apple Bring Your Own Device Data loss Connectivity Entertainment Remote Monitoring and Management SSD Botnet Server Management Printing Hiring/Firing Spam Blocking Files Biometrics Multi-Factor Security WhatsApp Telephony Database Business Technology HP Amazon Dongle Unified Communications Phone System Tech Support Printer Server User Tip Medical IT Environment iPhone WannaCry Hybrid Cloud Antivirus Streaming Media Analysis Facebook Paper Staffing Email Management Access Comparison Shortcut Voice over IP IT budget Tactics Users RAM Printers SaaS Big Data e-waste Information Technology HIPAA Cables Staff Downloads Storage Emergency Regulation Error CrashOverride Thank You Congratulations WiFi

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520