Why you should try Microsoft’s new browser

If you’re like most people, you probably have a preferred browser you use when surfing the web. You may even consider yourself set in your ways, and think there’s no chance you’d ever consider testing another browser. Well, Microsoft’s new wonder child, aptly called Edge, may have you thinking twice. With a wide set of […]

Read More

IE zero-day flaw you need to know

The tool that allows the vast majority of businesses to utilize the Internet in order to carry out their day-to-day operations is the browser. While there are numerous browsers available, many businesses rely on Internet Explorer (IE). This browser comes pre-installed on all machines using Windows. However, if you use IE, there is a new […]

Read More

Disable Tab Previews of Internet Explorer in Windows 7

If you are using Internet Explorer and Windows 7, you may have noticed that when you mouse over an IE browser window, a preview of the open tabs in the browser is shown. While this is useful to give you an idea of the sites you have open, it can get annoying if you have […]

Read More

New Flaw Called “Cookiejacking” Allows Hackers to Hijack Cookies in IE

Users of Internet Explorer beware: security researchers have found a new flaw in the popular Microsoft browser that allow hackers to commit something called “cookiejacking”, which enables them to steal information and data from IE cookies from any website. Despite a few flaws, Internet Explorer remains one of the most commonly used browsers in businesses today, making it a ripe target for hackers looking for security flaws to exploit. One such flaw has been discovered recently by a security researcher in Italy. Dubbed “cookiejacking”, the flaw allows hackers to hijack a cookie of any website, thereby allowing them to gain access to passwords, credit card information, and various other data stored in the cookie. The flaw is found in any version of Internet Explorer in any version of Windows. However, users must first drag and drop an item before the exploit can be activated. It might sound like a bit of a stretch, but hackers are known for their creativity, so expect that a seemingly appropriate situation will be presented in which you will find it perfectly normal to do a drag-and-drop action. Microsoft responded to the threat by labeling it as “low risk”, citing the level of user interaction required for cookiejacking to occur. It did, however, encourage users to be more vigilant and alert, as well as to refrain from clicking suspicious links and visiting dubious websites. Regardless of what platform or OS you use, there is always the constant threat from cyberattacks – all it takes is one attack to break through and put important business data at risk. It is essential to always educate users on how to avoid being victimized by scams and hacks, and to have the right security software to ensure that your company’s information is safe and secure. If you are interested in user training for security and / or better security protocols, please give us a call and we’ll be happy to draw up a custom security blueprint that’s tailor-made to meet your needs.

Read More

Control How Pop-ups Behave in Internet Explorer 8

Most people associate pop-ups with annoying advertisements that must be closed to continue reading the web page underneath. However, there are times when you need pop-ups to use a webpage as it was intended to be used. Learn to control how pop-ups behave when using IE8 on the web. Read more

Read More