l i n u x - u s e r s - g r o u p - o f - d a v i s
Next Meeting:
October 7: Social gathering
Next Installfest:
Latest News:
Aug. 18: Discounts to "Velocity" in NY; come to tonight's "Photography" talk
Page last updated:
2012 May 28 09:01

Reasons to Avoid Microsoft

[Bug] [Education] [Government] [Fear, Uncertainty, Doubt] [Security Hole] [MSN Hotmail] [MS Internet Explorer] [MS IIS Webserver] [MSN Instant Messenger] [License] [Linux/Open Source] [Monopoly] [MS Outlook] [Piracy] [Privacy] [Virus/Worm] [MS XBox] [MS Windows XP] [WOW!]
Show All

[MS Internet Explorer]

MS Internet Explorer

These pages are a compilation of links and quotes to news articles and others sources that might help convince you to switch to Linux.

  • Microsoft IE Flaw Exploited by Hackers to Steal Info From Google (Dailytech.com, 2010.01.15)
    [MS Internet Explorer] [Security Hole] [Privacy] In this case the flaw wasn't overly severe, but the attackers were unusually sophisticated and struck out at businesses, looking to steal their data. Writes Dmitri Alperovitch, a vice president of research with McAfee, 'We have never seen attacks of this sophistication in the commercial space. We have previously only seen them in the government space.'

  • Major IE8 flaw makes 'safe' sites unsafe (The Register, 2009.11.20)
    [Security Hole] [MS Internet Explorer] [WOW!] The latest version of Microsoft's Internet Explorer browser contains a bug that can enable serious security attacks against websites that are otherwise safe. The flaw in IE 8 can be exploited to introduce XSS, or cross-site scripting, errors on webpages that are otherwise safe... Ironically, the flaw resides in a protection added by Microsoft developers to IE 8 that's designed to prevent XSS attacks against sites.

  • Microsoft confirms that all versions of IE have critical new bug (ComputerWorld, 2008.12.12)
    [Security Hole] [MS Internet Explorer] [Microsoft] adds IE6 and IE8 Beta 2 to the list, recommends disabling .dll to stay safe. The unpatched bug in Internet Explorer 7 (IE7) that hackers are now exploiting also exists in older versions of the browser, including the still-widely-used IE6, Microsoft Corp. said late yesterday.

    Warning: Missing argument 6 for item(), called in /var/www/lugod/microsoft/index.php on line 637 and defined in /var/www/lugod/microsoft/includes.php on line 38

  • Internet Explorer Unsafe for 284 Days in 2006 (Washington Post 'Security Fix' Blog, 2007.01.03)
    [Security Hole] [Privacy] [MS Internet Explorer] [WOW!] For a total 284 days in 2006 (or more than nine months out of the year), exploit code for known, unpatched critical flaws in [IE] was publicly available on the Internet. Likewise, there were at least 98 days last year in which no software fixes from Microsoft were available to fix IE flaws that criminals were actively using to steal personal and financial data from users. ... In contrast, [the Open Source Mozilla Firefox browser] experienced a single period lasting just nine days last year in which exploit code for a serious security hole was posted online before Mozilla shipped a patch to remedy the problem.

  • IE7 flaw a canary in the coalmine? (iTWire, 2006.10.20)
    [MS Internet Explorer] [Security Hole] Internet Explorer 7 is supposed to be one of the big ones for Microsoft, a catchup browser five years in the making. Aside from the catchup features, it was the tighter security that was always going to be the clincher for many users, particularly in the business world. However, the perception of a more secure browsing experience with IE7 is already under strain with the discovery of a flaw just hours after release. ... one could question the entry of Microsoft into the security space on the eve of the release of Vista in the first place ... why [would] an operating system vendor in the process of releasing a supposedly rock solid secure system [...] believe there's money to be made out of security products for that system[?]

  • IE7 Vulnerability Discovered (Slashdot.org, 2006.10.19)
    [MS Internet Explorer] [Security Hole] Not 24 hours after the release of IE7, Secunia reports Internet Explorer Arbitrary Content Disclosure Vulnerability. So much for the 'you wanted it easier and more secure' slogan found on Microsoft's IE Website.

  • Three's a charm for MS06-042? (InfoWorld, 2006.09.12)
    [MS Internet Explorer] [Security Hole] It's patch Tuesday again, and Microsoft's hoping three's a charm for its wayward Cumulative [Internet Explorer] patch, MS06-042. The company quietly re-released (actually re-re-released) [the patch] today to fix yet another security hole introduced by the [previous] software update. ... the [Internet Explorer] patch was updated [...] to fix another remote code execution vulnerability ... That's almost identical to the problem introduced in the original version of the patch...

  • Hacked Ad Seen on MySpace Served Spyware to a Million (Washington Post, 2006.07.20)
    [MS Internet Explorer] [Security Hole] [WOW!] An online banner advertisement that ran on MySpace.com and other sites over the past week used a Windows security flaw to infect more than a million users with spyware when people merely browsed the sites with unpatched versions of Windows... online criminal groups have been using the flaw to install adware, keystroke loggers and all manner of invasive software for the past seven months. This stuff bombards the user with pop-up ads and tracks their Web usage. Only a little more than half of the anti-virus programs [tested] flagged the various programs that the Trojan tried to download as malicious or suspicious.

  • Yamanner - JavaScript worm that targets Yahoo! Mail (F-Secure, 2006.06.13)
    [MS Internet Explorer] [Security Hole] The Yamanner worm does not send itself as an attachment, it resides inside the e-mail body. The worm activates automatically by just opening an infected e-mail message with Internet Explorer.

  • Internet Explorer Window Loading Race Condition Address Bar Spoofing (Secunia, 2006.04.04)
    [MS Internet Explorer] [Security Hole] [WOW!] [A] vulnerability in Internet Explorer [has been discovered] which can be exploited by malicious people to conduct phishing attack.

  • Microsoft Confirms IE Under Attack (Microsoft Watch, 2006.03.25)
    [MS Internet Explorer] [Security Hole] [An] unpatched flaw in Internet Explorer [discovered last week is] already being exploited by hackers who are using hijacked Web servers and compromised Web sites to launch a wave of attacks against Microsoft browser users.

  • Spyware Barely Touches Firefox (Yahoo! News, 2006.02.09)
    [Linux/Open Source] [MS Internet Explorer] [Privacy] Internet Explorer users can be as much as 21 times more likely to end up with a spyware-infected PC than people who go online with Mozilla's Firefox browser, academic researchers [said]. ... [Researchers] sent their crawlers to 45,000 Web sites, cataloged the executable files found, and tested malicious sites' effectiveness by exposing unpatched versions of Internet Explorer and Firefox to "drive-by downloads." ... no domain managed to infect the Firefox-equipped PC in a drive-by download attack.

  • Critical Windows Patch Fights Takeover Attacks (eWeek, 2005.11.08)
    [Security Hole] [MS Internet Explorer] [MS Outlook] Three image-rendering flaws in the Windows operating system could put millions of Internet-connected users at risk of PC takeover attacks, Microsoft Corp. warned on Tuesday. The flaws could be exploited via any software that displays images, including the widely used Microsoft Outlook, Microsoft Word and Internet Explorer programs.

  • Microsoft probes report of IE flaw (CNet News, 2005.09.28)
    [Security Hole] [MS Internet Explorer] [WOW!] A new flaw in Internet Explorer could be exploited to launch spoof-based attacks, or access and change data on vulnerable PCs, security experts have warned. ... An attacker could spoof a legitimate Web site, access data from the Web browser's cache or stage a so-called man-in-the-middle attack, which taps into traffic between a user and another Web site... Fully-patched computers running Windows XP with Service Pack 2 and Internet Explorer 6.0 are vulnerable to this issue...

  • IE flaw puts Windows XP SP2 at risk (CNet News, 2005.09.16)
    [Security Hole] [MS Internet Explorer] A flaw has been discovered in Internet Explorer that could enable a remote attack on systems running Windows XP with Service Pack 2...

  • IE Plagued by 'Extremely Critical' Flaws (TechNewsWorld, 2005.01.10)
    [MS Internet Explorer] [Security Hole] [WOW!] Secunia recommends users drop IE and use an alternative browser. ... Millions of Internet Explorer 6 users are at risk from three 'extremely critical' security holes that give hackers open access to PCs running the browser -- even if Windows XP Service Pack Two has been installed. ... '[A] very critical vulnerability has been developed that can compromise a user's system without the need for user interaction besides visiting the malicious page.'

  • Microsoft Internet Explorer Multiple Vulnerabilities (Secunia, 2005.01.07)
    [MS Windows XP] [MS Internet Explorer] [Security Hole] [WOW!] Some vulnerabilities have been discovered in Internet Explorer, which can be exploited by malicious people to compromise a user's system, conduct cross-site/zone scripting and bypass a security feature in Microsoft Windows XP SP2. ... Vulnerability 1 and 2, or 3 alone, in combination with an inappropriate behaviour where the ActiveX Data Object (ADO) model can write arbitrary files can be exploited to compromise a user's system. This has been confirmed on a fully patched system with Internet Explorer 6.0 and Microsoft Windows XP SP2. Solution: Use another product.

  • Symantec: Phel Trojan horse attacks on Windows XP (Computer World, 2004.12.30)
    [MS Windows XP] [MS Internet Explorer] [Security Hole] The Trojan is capable of remotely controlling a user's system even if the latest Windows XP Service Pack, SP2, has been installed.

  • Internet Explorer DHTML Edit ActiveX Control Cross-Site Scripting (Secunia, 2004.12.16)
    [MS Internet Explorer] [Privacy] A vulnerability in Internet Explorer [has been discovered], which can be exploited by malicious people to conduct cross-site scripting attacks. The vulnerability has been confirmed on a fully patched system with Internet Explorer 6.0 and Microsoft Windows XP SP1/SP2.

  • Government says Finnish with IE 6 (ZDNet, 2004.11.29)
    [MS Internet Explorer] [Government] A government agency in Finland is urging the country's citizens to avoid use of Internet Explorer until Microsoft has patched the Bofra vulnerability. ... Microsoft has yet to announce when it will release a patch for the vulnerability, which was published at the beginning of November.

  • Who Profits from Security Holes? (Benjamin Edelman's website, 2004.11.18)
    [MS Windows XP] [MS Internet Explorer] [Security Hole] [WOW!] How bad is this problem? How much junk can get installed on a user's PC by merely visiting a single site? I set out to see for myself -- by visiting a single web page taking advantage of a security hole (in an ordinary fresh copy of Windows XP), and by recording what programs that site caused to be installed on my PC. In the course of my testing, my test PC was brought to a virtual stand-still -- with at least 16 distinct programs installed. I was not shown licenses or other installation prompts for any of these programs, and I certainly didn't consent to their installation on my PC.

  • Bofra worm sets trap for unwary (The Register, 2004.11.10)
    [MS Internet Explorer] [Security Hole] Bofra-A poses as photos from an adult webcam in an attempt to fool users into clicking on a link. Clicking on the link causes the targeted PC to run malicious script hosted on a previously infected computer. ... Once a new system is infected, the worm sets up an embedded web server... Infected PCs establish an IRC session... allowing hackers to control compromised machines. The worm also harvests to further its propagation. Unlike standard bulk-mailing worms, Bofra does not send copies of itself within infected email but a HTTP link that points to the host that sent the infected email.

  • Double MyDoom for Internet Explorer flaw (ZDNet News, 2004.11.09)
    [MS Internet Explorer] [Security Hole] The viruses use a vulnerability in Microsoft's Internet Explorer 6.0 that allows an attacker to run a program on a computer just by getting the user to click on a link.

  • New URL spoofing bug in Microsoft Internet Explorer (SecurityFocus BUGTRAQ, 2004.10.28)
    [MS Internet Explorer] [Bug] There is a security bug in Internet Explorer 6.0.2800.1106 (fully patched), which allowes to show any faked target-address in the status bar of the window.

Next 25 Articles

Collection originally created by, donated to LUGOD by, and maintained by Bill Kendrick.

Microsoft, Internet Explorer, Outlook, IIS, XP, XBox, etc. are trademarks or registered trademarks of Microsoft.
Linux is a trademark of Linus Torvalds.
Most category icons created by Bill Kendrick.

LUGOD Group on LinkedIn
Sign up for LUGOD event announcements
Your email address:
LUGOD Group on Facebook
'Like' LUGOD on Facebook:

Hosting provided by:
Sunset Systems
Sunset Systems offers preconfigured Linux systems, remote system administration and custom software development.

LUGOD: Linux Users' Group of Davis
PO Box 2082, Davis, CA 95617
Contact Us

LUGOD is a 501(c)7 non-profit organization
based in Davis, California
and serving the Sacramento area.
"Linux" is a trademark of Linus Torvalds.

Sponsored in part by:
Sunset Systems
Who graciously hosts our website & mailing lists!