Internet Explorer Loophole Let The Cookie Jacking Monster In
- Author Penny Lee
- Published August 3, 2011
- Word count 567
What has a broad user base, tons of glitches and a loophole that lets hackers have access to your personal information including your credit card information? Internet Explorer. Maybe the real question is, why use a browser that puts your system and information at risk?
For a Browser that is commonly known for it's bugs, Internet Explorer continues to enjoy a large user base. Explorer's broad user base and glitchy system make it the perfect target for hackers looking for a loophole to gain access to information. Explorer also dubbed "Exploder" by many web designers has recently gained a lot of attention for one of it's most recent flaws. This flaw, called "cookiejacking", allows hackers to gain access to your passwords, credit card information, and various other data stored in a cookie from any website.
This particular flaw is found in any version of Internet Explorer used in any version of Windows. Clever hackers have found a way to turn a seemingly harmless action into a gateway to your personal information. Hackers are currently able to gain access to users cookies from any website when the system user initiates the drag and drop action. Often times this action is instigated through some devious and fraudulent technique disquised as a legitimate advertisement or query targeted at gaining your personal information.
An Independent researcher, Rosario Valotta, demonstrated proof of "cookiejacking" at the recent Hack in the Box security conference in Amsterdam. Valotta specifically targeted cookies issued by Facebook, Twitter and Google Mail which are the most common targets of scams designed to gain personal information, in his demonstration. Valotta also said, "the technique can be used on virtually any website and affects all versions of Windows. You can steal any cookie," he told The Register.
Microsoft has stated that this type of hack is "low risk" and urges users to be more vigilant about the sites they visit and apparently turning on the "private browsing feature" prevents access to the cookie files saved on disk and in active session memory. Microsoft believes that people will not be easily duped into performing a task that allows entry. I think this is an underestimation on how clever hack schemes can be as well as the common users ability to identify a ploy. Moreover, I'm just plain tired of bugs, patches, fixes and flaws for a such a widely used web browser. With competition ranging from Google Chrome to Firefox, I'm surprised at how many people stay loyal to Internet Explorer. Any of these browsers allow hassle free searching presented in a clear manner and without all the problems or security risks.
With the large amount of business done online today companies and individuals can't afford to be nonchalant about their computer security no matter how "low risk" the threat is. As Microsoft says, If it's easy enough to avoid risky sites, then by applying the same logic, it's easy enough to avoid risky browsers such as Exploder. It only takes one successful attack to put your company and personal information at risk.
As a rule any Business should look into hiring certified computer network techs or an IT support company for additional security support. If you have any concerns as to whether your system or network has been put at risk you should consult a computer repair or support specialist. As with any line of defense the best protection is prevention.
Penny Lee specializes in providing reliable computer support and computer repair to businesses that want to improve productivity and profitability. With IT support and Computer Networking that better maps to your business, you’ll never have to worry about technology again.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- Beyond the Razor: A Complete Guide to Gentle Hair Removal.
- Nourishing Beauty from Within: How to Strengthen Hair, Brighten Skin, and Protect Nails Naturally.
- Unlocking Inner Beauty: The Science of Stronger Hair, Radiant Skin, and Resilient Nails.
- The Secret to Silky Skin: Modern Hair Removal Solutions Explained.
- Wildly Elegant: Why Antelope Carpet Is the Ultimate Patterned Carpet for Luxury Homes
- Automatic Driving Lessons in Glasgow: Your Top FAQs Answered by Autogear Experts
- FAQ Guide: Everything Caledon Homeowners Should Know About Choosing Lighting from Fehmi Lights
- The Evolution of Compact Cinema Cameras: From Studio Rigs to Agile Setups
- Smooth Confidence: The Ultimate Guide to Effective Hair Removal.
- The Natural Path to Stronger Hair, Glowing Skin, and Healthier Nails.
- Smooth Skin Ahead: How to Remove Skin Tags Safely and Naturally.
- Smooth Skin Ahead: Natural Paths to Reducing the Appearance of Scars.
- The Art of Carved Doors: From Rustic Charm to Modern Elegance
- The Pediroller: A Simple Tool with a Profound Impact on Foot Health
- Fading Scars Naturally: How to Restore Smoother, Even-Toned Skin.
- Say Goodbye to Skin Tags Naturally: A Complete Guide to Gentle Removal.
- Refresh Your Home with the Carefree Spirit of Boho Decor
- The Charm of Modern Farmhouse Décor
- Luxury That Lasts: Why Happy Feet Flooring Is a Smart Investment
- The Real Reason Bamboo Pajamas Cost More—And Why GYS Makes Them Worth Every Penny
- Mastering Camera Support: How Precision Fluid Heads Transform Cinematic Movement
- Color Reproduction and Skin Tones — The Real Challenge for Modern Cinema Lenses
- The Use of Electric Callus Removers: A Modern Approach to Foot Care
- Clearer Skin Naturally: The Complete Guide to Safe and Effective Skin Tag Removal.
- Fading Scars Naturally: How to Restore Smoother, Even-Toned Skin.
- Varicose Veins Demystified: From Early Warning Signs to Proven Relief.
- Clearer Days Ahead: How to Effectively Treat and Manage Rosacea Symptoms.
- The Death of Expertise: Navigating the Political Landscape
- Hospitality Meets Worship: Church Carpet That Welcomes
- Using Toe Straighteners to Help Foot Problems