![]() |
eEye issues workaround against unpatched IE flaw ![]() The critical vulnerability, which involves the way IE handles HTML Objects, affects even fully patched Windows XP systems. Exploits allow hackers to commandeer vulnerable machines by tricking surfers into visiting websites containing malicious code. Users are advised to disable Active Scripting from within Internet Explorer as a workaround pending the arrival of a patch from Microsoft, expected on Tuesday, 11 April. Disabling Active Scripting might prove problematic in some environments, however, so eEye has stepped in to fill the breach with a temporary workaround. Continue at source News Source: Channel Register |
All times are GMT -4. The time now is 07:13 PM. |
Copyright © 2005-2013 SysChat.com