This security update addresses nineteen privately reported vulnerabilities in Internet Explorer, which can lead to an attacker executing a malware once a user access a malicious webpage via Internet Explorer. Its exploit may also allow an attack to gain same user rights as the current user.
A complete discussion of the different vulnerability categories, including case studies of vulnerable SCADA HMIs. The paper also provides a guide for vulnerability researchers, as well as vendors on quick and efficient bug discovery.
Cybercriminals can turn unsecure home routers into slaves for their botnets or even abuse them to steal banking credentials. Know about your router’s hidden weaknesses and the many ways you can defend your homes and businesses against these threats.