LOGO

Internet Explorer Security Vulnerability: Protect Your System

February 4, 2010
Internet Explorer Security Vulnerability: Protect Your System

Addressing a Recent Internet Explorer Security Vulnerability

The phrase "IE Security Hole" is frequently encountered, and a new vulnerability has emerged. This flaw potentially allows malicious websites to gain unauthorized access to your files. While not ideal, several preventative measures can be implemented.

It’s important to understand that these are temporary solutions, not a complete fix for the underlying vulnerability. However, these strategies are broadly applicable to various IE security concerns.

Enable Protected Mode

For users of Windows 7 or Vista, activating Protected Mode is crucial. This feature operates similarly to a sandbox, providing an additional layer of protection against harmful web pages.

Navigate to Internet Options, then select the Security tab, and ensure the corresponding checkbox is selected.

Manage ActiveX Controls

Adjusting the security slider to 'High' will prevent ActiveX Controls from running automatically. This action, however, may result in more frequent prompts when visiting websites that utilize these controls.

Microsoft suggests adding trusted websites to your Trusted Sites list. This may necessitate deselecting the "Require https" checkbox. To add a site, access the Trusted Sites icon, click 'Sites', enter the URL, and confirm your selection.

Disable Unnecessary Plugins

Access the Manage Add-ons section through the IE menu (Tools –> Manage Add-ons). Change the "Show" dropdown to "All add-ons" to view a comprehensive list of currently enabled add-ons.

You can then begin disabling add-ons by selecting them and clicking 'Disable'. Consider disabling Adobe Reader and Java if they are not essential, as these applications have historically presented security risks.

A prudent approach is to disable all non-essential add-ons and re-enable them only when specifically required. Disabling unnecessary add-ons can also significantly improve Internet Explorer's performance.

Utilize Microsoft FixIt

Microsoft's "Fix it" feature, available on their support site, provides a convenient solution for many technical issues. In this instance, it can be used to enable Network Protocol Lockdown.

Click the link to access the Microsoft site and utilize the Fix it tool.

Further information regarding this security vulnerability (as of February 4th, 2010) is available for review.

#Internet Explorer#security#vulnerability#security hole#browser security#Microsoft