Internet Explorer Zero-Day Vulnerability

BeckyStrause

Have you heard about this vulnerability?

What is the vulnerability?
This vulnerability, which FireEye Research identified in Internet Explorer, uses a combination of Flash and Internet Explorer to allow an attacker to gain the ability to run any application with the user permissions of the current logged-in user, giving the attacker access to everything on the user’s computer that the user has access to. If the current user is logged on with administrative user rights, the attacker would have the same rights. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

What should you do?
If possible, stop using Internet Explorer. Use either Mozilla Firefox , or Google Chrome. Both can be downloaded for free.

If you have to use IE, please refer to Microsoft’s Security Advisory on this vulnerability to see their lists of suggested actions.  In a few hours, Microsoft will be issuing a fix for the vulnerability, according to ZDNet.

If you have any questions or concerns about this, or any other vulnerability you hear about, feel free to contact Eberly Systems.

 

By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers
By Eberly Systems July 9, 2024
Keeping you abreast of security news