Vulnerabilities can open in common programs

Vulnerabilities can open in common programs

The most common applications in offices around the world could play host to security flaws. Knowing of current issues and keeping software up to date are serious elements of IT security efforts. According to TechNewsWorld, Internet Explorer is the latest program to spring a leak. The popular Microsoft system could be vulnerable to very serious exploits, leading top security officials to encourage office personnel not to use it at all.

Popular browser broken
Some of the warnings about the new Internet Explorer flaw have come from high places. According to TechNewsWorld, the German government suggested that all users seek an alternative online portal as long as the weakness is unpatched. The source noted that the problem is a "zero day" bug, one that slipped through the developer's inspection process and shipped with a piece of software, only to be discovered by a third party.

Microsoft, for its part, has warned its user community about the vulnerability. The software giant issued a security bulletin warning that sites specifically designed to work with the bug could disrupt computers' memories. The problem is not limited to new versions of Internet Explorer or obsolete browser setups. It affects Explorer models six through nine, for Windows XP, Vista and 7. Net Applications marketer Vince Vizzaccaro told TechNewsWorld that the problem is unlikely to affect Microsoft's browser market share, despite its severity, as security bugs are generally not widely known.

Big time exploits
According to Kaspersky Lab's ThreatPost, security professionals need to think of a new way to contextually sort the dangers to programs. The source explained that many possible vulnerabilities are never used and some serious holes in little-used programs rank high on security warning lists, despite the fact that hackers prefer to work with large-circulation applications. As a standard part of Windows computers, of course, Internet Explorer is a prime target.