Internet Explorer Loophole Let The Cookie Jacking Monster In
- Author Penny Lee
- Published August 3, 2011
- Word count 567
What has a broad user base, tons of glitches and a loophole that lets hackers have access to your personal information including your credit card information? Internet Explorer. Maybe the real question is, why use a browser that puts your system and information at risk?
For a Browser that is commonly known for it's bugs, Internet Explorer continues to enjoy a large user base. Explorer's broad user base and glitchy system make it the perfect target for hackers looking for a loophole to gain access to information. Explorer also dubbed "Exploder" by many web designers has recently gained a lot of attention for one of it's most recent flaws. This flaw, called "cookiejacking", allows hackers to gain access to your passwords, credit card information, and various other data stored in a cookie from any website.
This particular flaw is found in any version of Internet Explorer used in any version of Windows. Clever hackers have found a way to turn a seemingly harmless action into a gateway to your personal information. Hackers are currently able to gain access to users cookies from any website when the system user initiates the drag and drop action. Often times this action is instigated through some devious and fraudulent technique disquised as a legitimate advertisement or query targeted at gaining your personal information.
An Independent researcher, Rosario Valotta, demonstrated proof of "cookiejacking" at the recent Hack in the Box security conference in Amsterdam. Valotta specifically targeted cookies issued by Facebook, Twitter and Google Mail which are the most common targets of scams designed to gain personal information, in his demonstration. Valotta also said, "the technique can be used on virtually any website and affects all versions of Windows. You can steal any cookie," he told The Register.
Microsoft has stated that this type of hack is "low risk" and urges users to be more vigilant about the sites they visit and apparently turning on the "private browsing feature" prevents access to the cookie files saved on disk and in active session memory. Microsoft believes that people will not be easily duped into performing a task that allows entry. I think this is an underestimation on how clever hack schemes can be as well as the common users ability to identify a ploy. Moreover, I'm just plain tired of bugs, patches, fixes and flaws for a such a widely used web browser. With competition ranging from Google Chrome to Firefox, I'm surprised at how many people stay loyal to Internet Explorer. Any of these browsers allow hassle free searching presented in a clear manner and without all the problems or security risks.
With the large amount of business done online today companies and individuals can't afford to be nonchalant about their computer security no matter how "low risk" the threat is. As Microsoft says, If it's easy enough to avoid risky sites, then by applying the same logic, it's easy enough to avoid risky browsers such as Exploder. It only takes one successful attack to put your company and personal information at risk.
As a rule any Business should look into hiring certified computer network techs or an IT support company for additional security support. If you have any concerns as to whether your system or network has been put at risk you should consult a computer repair or support specialist. As with any line of defense the best protection is prevention.
Penny Lee specializes in providing reliable computer support and computer repair to businesses that want to improve productivity and profitability. With IT support and Computer Networking that better maps to your business, you’ll never have to worry about technology again.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- Strange, Surreal, and Spectacular: A Day at Ripley's Believe It or Not! Pattaya"
- 🌴 "Beyond the Beach: Top Adventures in Pattaya, Thailand for 2025"
- Awakening the Inner Self: A Journey Guided by Mala Beads and Sacred Spaces
- Echoes of Resistance: The Unyielding Spirit of Rome, Open City.
- Cary Grant: The Quintessential Leading Man and His Tumultuous Love Life.
- Rooted & Refined: A Home Where Two Histories Meet
- The Devil You Know: Scorsese, De Niro, and the Chilling Reinvention of Cape Fear.
- Vittorio De Sica: The Heartbeat of Italian Neorealism.
- Is Staying in a Luxury Hotel Really Worth the Cost?
- How the IRS Is Changing and Why You Need a Tax Attorney Now More Than Ever
- Scarface: The Rise, Fall, and Legacy of Tony Montana.
- Chilling at Jomtien Beach: A Perfect Day in Pattaya
- 🌴 InterContinental Pattaya Resort: A Luxurious Beachfront Escape
- ✈️ International Airlines Operating to Thailand in Off-Peak Season 2025
- A Personalized Aesthetic: Where Antiques Tell the Story of Your Home
- ✈️ Ultimate Skincare Essentials for Long-Haul Flights: Stay Fresh at 35,000 Feet
- 🌴 Essential Preparations to Make Before Going on Holiday
- Why Traveling Overseas During Off-Peak Seasons Might Be the Smartest Move You'll Make
- Anthony Quinn: The Eternal Outsider Who Became a Legend.
- Off-The-Beaten-Path Experiences and Things to Explore in Rural Thailand
- 🌍 20 Different Kinds of Hotels to Experience at Least Once
- Top Things to Do in Pattaya Beach, Thailand: Your Ultimate Travel Guide
- Exploring the Final Frontier: The Legacy of Star Trek and Its Iconic Cast.
- How to deal with losing clients as a freelance web developer?
- Lighting Specialists Ready to Assist You at our Brampton Location
- Telly Savalas: The Cool Rebel Who Redefined Toughness in Hollywood.
- Moody Vibes Only: Statement Pieces
- The King Beyond the Spotlight: Unveiling the True Elvis Presley.
- Where Soul Meets Space: Curating with Character
- Cinematic Titans: Inside the Billion-Dollar Club.