mention_id
stringlengths 12
20
| split
stringclasses 1
value | men_type
stringclasses 2
values | doc_id
stringclasses 574
values | sentence_id
stringclasses 24
values | sentence
stringlengths 22
366
| token_start
stringclasses 63
values | token_end
stringclasses 64
values | start_char
stringclasses 282
values | end_char
stringclasses 294
values | mention_text
stringlengths 1
102
| gold_cluster
stringlengths 1
20
| lemma
stringlengths 1
17
| sentence_tokens
stringlengths 18
347
| marked_sentence
stringlengths 31
375
| marked_doc
stringlengths 58
16.6k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
27_5ecb.xml_28 | train | ent | 27_5ecb.xml | 2 | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | 20 | 20 | 126 | 134 | browsers | NON16628187313283286 | browser | ['microsoft', 'wednesday', 'take', 'rare', 'step', 'issue', 'patch', 'numerous', 'security', 'expert', 'advise', 'people', 'switch', 'rival', 'browser', 'microsoft', 'fix', 'problem'] | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival <m> browsers </m> until Microsoft fixed the problem . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival <m> browsers </m> until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_60 | train | ent | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 18 | 18 | 106 | 110 | that | NON16727620231965862 | that | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw <m> that </m> allowed hackers to take over computers merely by steering them to infected websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw <m> that </m> allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_30 | train | ent | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 28 | 28 | 169 | 173 | them | NON16728230766371174 | they | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering <m> them </m> to infected websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering <m> them </m> to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_31 | train | ent | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 24 | 24 | 140 | 149 | computers | NON16728230766371174 | computer | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over <m> computers </m> merely by steering them to infected websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over <m> computers </m> merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_32 | train | ent | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 8 | 9 | 48 | 65 | Internet Explorer | NON16628072497530110 | Internet | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has issued an emergency patch for its <m> Internet Explorer </m> browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its <m> Internet Explorer </m> browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_40 | train | ent | 27_5ecb.xml | 2 | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | 1 | 1 | 10 | 19 | Wednesday | TIM27376179174463069 | Wednesday | ['microsoft', 'wednesday', 'take', 'rare', 'step', 'issue', 'patch', 'numerous', 'security', 'expert', 'advise', 'people', 'switch', 'rival', 'browser', 'microsoft', 'fix', 'problem'] | Microsoft <m> Wednesday </m> took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft <m> Wednesday </m> took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_62 | train | ent | 27_5ecb.xml | 2 | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | 22 | 22 | 141 | 150 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'wednesday', 'take', 'rare', 'step', 'issue', 'patch', 'numerous', 'security', 'expert', 'advise', 'people', 'switch', 'rival', 'browser', 'microsoft', 'fix', 'problem'] | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until <m> Microsoft </m> fixed the problem . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until <m> Microsoft </m> fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_36 | train | evt | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 14 | 14 | 86 | 89 | fix | ACT16632539609441083 | fix | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to <m> fix </m> a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to <m> fix </m> a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_37 | train | evt | 27_5ecb.xml | 2 | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | 23 | 23 | 151 | 156 | fixed | ACT16632539609441083 | fix | ['microsoft', 'wednesday', 'take', 'rare', 'step', 'issue', 'patch', 'numerous', 'security', 'expert', 'advise', 'people', 'switch', 'rival', 'browser', 'microsoft', 'fix', 'problem'] | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft <m> fixed </m> the problem . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft <m> fixed </m> the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_41 | train | evt | 27_5ecb.xml | 2 | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | 14 | 14 | 92 | 99 | advised | 10000001958 | advise | ['microsoft', 'wednesday', 'take', 'rare', 'step', 'issue', 'patch', 'numerous', 'security', 'expert', 'advise', 'people', 'switch', 'rival', 'browser', 'microsoft', 'fix', 'problem'] | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts <m> advised </m> people to switch to rival browsers until Microsoft fixed the problem . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts <m> advised </m> people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_42 | train | evt | 27_5ecb.xml | 2 | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | 17 | 17 | 110 | 116 | switch | 10000001959 | switch | ['microsoft', 'wednesday', 'take', 'rare', 'step', 'issue', 'patch', 'numerous', 'security', 'expert', 'advise', 'people', 'switch', 'rival', 'browser', 'microsoft', 'fix', 'problem'] | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to <m> switch </m> to rival browsers until Microsoft fixed the problem . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to <m> switch </m> to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_46 | train | evt | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 2 | 2 | 14 | 20 | issued | ACT16632487083891659 | issue | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has <m> issued </m> an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has <m> issued </m> an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_47 | train | evt | 27_5ecb.xml | 2 | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | 7 | 7 | 42 | 49 | issuing | ACT16632487083891659 | issue | ['microsoft', 'wednesday', 'take', 'rare', 'step', 'issue', 'patch', 'numerous', 'security', 'expert', 'advise', 'people', 'switch', 'rival', 'browser', 'microsoft', 'fix', 'problem'] | Microsoft Wednesday took the rare step of <m> issuing </m> the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of <m> issuing </m> the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_52 | train | evt | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 12 | 12 | 76 | 82 | aiming | 10000001960 | aim | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has issued an emergency patch for its Internet Explorer browser , <m> aiming </m> to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , <m> aiming </m> to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_53 | train | evt | 27_5ecb.xml | 2 | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | 2 | 2 | 20 | 24 | took | 10000001961 | take | ['microsoft', 'wednesday', 'take', 'rare', 'step', 'issue', 'patch', 'numerous', 'security', 'expert', 'advise', 'people', 'switch', 'rival', 'browser', 'microsoft', 'fix', 'problem'] | Microsoft Wednesday <m> took </m> the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday <m> took </m> the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_54 | train | evt | 27_5ecb.xml | 2 | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | 5 | 5 | 34 | 38 | step | 10000001962 | step | ['microsoft', 'wednesday', 'take', 'rare', 'step', 'issue', 'patch', 'numerous', 'security', 'expert', 'advise', 'people', 'switch', 'rival', 'browser', 'microsoft', 'fix', 'problem'] | Microsoft Wednesday took the rare <m> step </m> of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare <m> step </m> of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_55 | train | evt | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 30 | 30 | 177 | 185 | infected | 10000001963 | infected | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to <m> infected </m> websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to <m> infected </m> websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_29 | train | evt | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 27 | 27 | 160 | 168 | steering | 10000001964 | steer | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by <m> steering </m> them to infected websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by <m> steering </m> them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_35 | train | evt | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 22 | 23 | 130 | 139 | take over | ACT16632565623246075 | take | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to <m> take over </m> computers merely by steering them to infected websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to <m> take over </m> computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_56 | train | evt | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 4 | 4 | 24 | 33 | emergency | 10000001965 | emergency | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has issued an <m> emergency </m> patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an <m> emergency </m> patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_57 | train | evt | 27_5ecb.xml | 2 | Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem . | 12 | 12 | 75 | 83 | security | 10000001966 | security | ['microsoft', 'wednesday', 'take', 'rare', 'step', 'issue', 'patch', 'numerous', 'security', 'expert', 'advise', 'people', 'switch', 'rival', 'browser', 'microsoft', 'fix', 'problem'] | Microsoft Wednesday took the rare step of issuing the patch after numerous <m> security </m> experts advised people to switch to rival browsers until Microsoft fixed the problem . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous <m> security </m> experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_5ecb.xml_61 | train | evt | 27_5ecb.xml | 1 | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that allowed hackers to take over computers merely by steering them to infected websites . | 19 | 19 | 111 | 118 | allowed | ACT27376725138038411 | allow | ['microsoft', 'issue', 'emergency', 'patch', 'internet', 'explorer', 'browser', 'aim', 'fix', 'critical', 'flaw', 'allow', 'hacker', 'computer', 'merely', 'steer', 'infected', 'website'] | Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that <m> allowed </m> hackers to take over computers merely by steering them to infected websites . | Microsoft issues emergency patch for Internet Explorer
Microsoft has issued an emergency patch for its Internet Explorer browser , aiming to fix a critical flaw that <m> allowed </m> hackers to take over computers merely by steering them to infected websites .
Microsoft Wednesday took the rare step of issuing the patch after numerous security experts advised people to switch to rival browsers until Microsoft fixed the problem .
Microsoft usually releases patches on a set schedule and this is only the third emergency patch in the last three years .
The flaw has been in circulation since the first week of December .
So far , more than two million computers are believed to have been infected , according to PC Magazine .
The vulnerabilities are found on copies of Internet Explorer 7 , as well as IE6 and IE5 .
The patch is designed to prevent attackers from downloading malware onto users ' computers if they visit a malicious Web site , or a legitimate Web site that has been infected . |
27_11ecb.xml_30 | train | ent | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 0 | 0 | 0 | 9 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | <m> Microsoft </m> on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | Microsoft releases emergency patch for IE
<m> Microsoft </m> on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_41 | train | ent | 27_11ecb.xml | 2 | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | 15 | 15 | 109 | 114 | their | HUM16627963455277878 | their | ['software', 'giant', 'say', 'security', 'update', 'ms08-078', 'address', 'vulnerability', 'cyber-criminal', 'exploit', 'advantage'] | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to <m> their </m> advantage . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to <m> their </m> advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_28 | train | ent | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 14 | 14 | 92 | 99 | hackers | HUM16627963455277878 | hacker | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing <m> hackers </m> to hijack Internet Explorer browsers and take over computers . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing <m> hackers </m> to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_29 | train | ent | 27_11ecb.xml | 2 | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | 11 | 11 | 78 | 93 | cyber-criminals | HUM16627963455277878 | cyber-criminal | ['software', 'giant', 'say', 'security', 'update', 'ms08-078', 'address', 'vulnerability', 'cyber-criminal', 'exploit', 'advantage'] | The US software giant said security update MS08-078 addresses a vulnerability <m> cyber-criminals </m> can exploit to their advantage . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability <m> cyber-criminals </m> can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_31 | train | ent | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 23 | 23 | 151 | 160 | computers | NON16728230766371174 | computer | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over <m> computers </m> . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over <m> computers </m> .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_35 | train | ent | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 12 | 12 | 78 | 82 | flaw | NON16727620231965862 | flaw | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on Wednesday released an emergency patch to fix a perilous software <m> flaw </m> allowing hackers to hijack Internet Explorer browsers and take over computers . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software <m> flaw </m> allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_36 | train | ent | 27_11ecb.xml | 2 | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | 10 | 10 | 64 | 77 | vulnerability | NON16727620231965862 | vulnerability | ['software', 'giant', 'say', 'security', 'update', 'ms08-078', 'address', 'vulnerability', 'cyber-criminal', 'exploit', 'advantage'] | The US software giant said security update MS08-078 addresses a <m> vulnerability </m> cyber-criminals can exploit to their advantage . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a <m> vulnerability </m> cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_37 | train | ent | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 6 | 6 | 45 | 50 | patch | NON16727641175459595 | patch | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on Wednesday released an emergency <m> patch </m> to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency <m> patch </m> to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_38 | train | ent | 27_11ecb.xml | 2 | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | 6 | 7 | 36 | 51 | update MS08-078 | NON16727641175459595 | ms08-078 | ['software', 'giant', 'say', 'security', 'update', 'ms08-078', 'address', 'vulnerability', 'cyber-criminal', 'exploit', 'advantage'] | The US software giant said security <m> update MS08-078 </m> addresses a vulnerability cyber-criminals can exploit to their advantage . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security <m> update MS08-078 </m> addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_46 | train | ent | 27_11ecb.xml | 2 | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | 2 | 2 | 7 | 15 | software | 10000001967 | software | ['software', 'giant', 'say', 'security', 'update', 'ms08-078', 'address', 'vulnerability', 'cyber-criminal', 'exploit', 'advantage'] | The US <m> software </m> giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US <m> software </m> giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_25 | train | ent | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 17 | 18 | 110 | 127 | Internet Explorer | NON16628072497530110 | Internet | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack <m> Internet Explorer </m> browsers and take over computers . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack <m> Internet Explorer </m> browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_32 | train | ent | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 2 | 2 | 13 | 22 | Wednesday | TIM27376179174463069 | Wednesday | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on <m> Wednesday </m> released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | Microsoft releases emergency patch for IE
Microsoft on <m> Wednesday </m> released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_47 | train | ent | 27_11ecb.xml | 2 | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | 3 | 3 | 16 | 21 | giant | HUM16627702263331271 | giant | ['software', 'giant', 'say', 'security', 'update', 'ms08-078', 'address', 'vulnerability', 'cyber-criminal', 'exploit', 'advantage'] | The US software <m> giant </m> said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software <m> giant </m> said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_33 | train | evt | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 3 | 3 | 23 | 31 | released | ACT16632487083891659 | release | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on Wednesday <m> released </m> an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | Microsoft releases emergency patch for IE
Microsoft on Wednesday <m> released </m> an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_39 | train | evt | 27_11ecb.xml | 2 | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | 13 | 13 | 98 | 105 | exploit | ACT16759694191093666 | exploit | ['software', 'giant', 'say', 'security', 'update', 'ms08-078', 'address', 'vulnerability', 'cyber-criminal', 'exploit', 'advantage'] | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can <m> exploit </m> to their advantage . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can <m> exploit </m> to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_23 | train | evt | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 21 | 22 | 141 | 150 | take over | ACT16632565623246075 | take | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and <m> take over </m> computers . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and <m> take over </m> computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_24 | train | evt | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 16 | 16 | 103 | 109 | hijack | ACT27376525645832010 | hijack | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to <m> hijack </m> Internet Explorer browsers and take over computers . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to <m> hijack </m> Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_26 | train | evt | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 8 | 8 | 54 | 57 | fix | ACT16632539609441083 | fix | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on Wednesday released an emergency patch to <m> fix </m> a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to <m> fix </m> a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_27 | train | evt | 27_11ecb.xml | 2 | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | 8 | 8 | 52 | 61 | addresses | ACT16632539609441083 | address | ['software', 'giant', 'say', 'security', 'update', 'ms08-078', 'address', 'vulnerability', 'cyber-criminal', 'exploit', 'advantage'] | The US software giant said security update MS08-078 <m> addresses </m> a vulnerability cyber-criminals can exploit to their advantage . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 <m> addresses </m> a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_34 | train | evt | 27_11ecb.xml | 2 | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | 4 | 4 | 22 | 26 | said | ACT16727656023335002 | say | ['software', 'giant', 'say', 'security', 'update', 'ms08-078', 'address', 'vulnerability', 'cyber-criminal', 'exploit', 'advantage'] | The US software giant <m> said </m> security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant <m> said </m> security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_40 | train | evt | 27_11ecb.xml | 2 | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | 16 | 16 | 115 | 124 | advantage | 10000001968 | advantage | ['software', 'giant', 'say', 'security', 'update', 'ms08-078', 'address', 'vulnerability', 'cyber-criminal', 'exploit', 'advantage'] | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their <m> advantage </m> . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their <m> advantage </m> .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_42 | train | evt | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 5 | 5 | 35 | 44 | emergency | 10000001969 | emergency | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on Wednesday released an <m> emergency </m> patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an <m> emergency </m> patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_43 | train | evt | 27_11ecb.xml | 2 | The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | 5 | 5 | 27 | 35 | security | 10000001970 | security | ['software', 'giant', 'say', 'security', 'update', 'ms08-078', 'address', 'vulnerability', 'cyber-criminal', 'exploit', 'advantage'] | The US software giant said <m> security </m> update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said <m> security </m> update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_11ecb.xml_48 | train | evt | 27_11ecb.xml | 1 | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers . | 13 | 13 | 83 | 91 | allowing | ACT27376725138038411 | allow | ['microsoft', 'wednesday', 'release', 'emergency', 'patch', 'fix', 'perilous', 'software', 'flaw', 'allow', 'hacker', 'hijack', 'internet', 'explorer', 'browser', 'computer'] | Microsoft on Wednesday released an emergency patch to fix a perilous software flaw <m> allowing </m> hackers to hijack Internet Explorer browsers and take over computers . | Microsoft releases emergency patch for IE
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw <m> allowing </m> hackers to hijack Internet Explorer browsers and take over computers .
The US software giant said security update MS08-078 addresses a vulnerability cyber-criminals can exploit to their advantage .
`` Microsoft encourages all IE customers to test and deploy this update as soon as possible , '' said Microsoft security response communications head Christopher Budd .
The threat led Microsoft to mobilize security engineering teams worldwide to deliver a software cure `` in the unprecedented time of eight days . ''
According to researchers at software security firm Trend Micro , attacks based on the vulnerability in the world 's most popular Web browser were spreading `` like wildfire '' with millions of computers already compromised .
Microsoft typically releases patches for its software on the second Tuesday of each month and rushing this fix to computer users out-of-cycle is testimony to the severe danger of the threat , according to Trend Micro .
`` People should run , not walk , to get it installed , '' said Trend Micro advanced threat researcher Paul Ferguson .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day . ''
The IE software patch will be automatically applied to hundreds of millions of personal computers due to standard update settings in the machines , according to Microsoft Security Response Alliance director Mike Reavey .
Wednesday morning , business networks using IE began getting the critical fix through routine patching processes .
Reavey said Microsoft went into `` emergency response '' mode on December 9 after it first learned of the attacks on IE browsers .
A day later , Microsoft published a security advisory that `` listed workarounds that blocked all known attacks . ''
`` Over the course of the next eight days , this advisory was updated five times , adding newer workarounds and mitigations , '' Reavey said .
`` We also continually monitored the threat environment , noting when the attacks began to change in nature and scope . ''
Trend Micro has identified about 10,000 websites that have been infected with malicious software that can be surreptitiously slipped into visitors ' unprotected IE browsers to take advantage of the flaw .
A major Internet portal in Taiwan is among the legitimate websites unknowingly tainted with malicious software aimed at IE 's weak spot , according to Ferguson .
Hackers can take control of infected computers , steal data , redirect browsers to dubious websites , and use machines for devious activities such as attacks on other networks , according to security specialists .
`` What makes this so insidious is it takes advantage of a big gaping hole of IE , which has the largest install base of any browser on the market , '' Ferguson said .
IE is used on nearly three-quarters of the world 's computers , according to industry statistics from November .
Reavey said the patch consists of more than 300 distinct updates for more than half-a-dozen versions of IE in scores of languages .
Analyst Rob Enderle of Enderle Group in Silicon Valley said it was `` amazing '' that Microsoft was able to turn out a complex critical fix in a week when such jobs typically can take a month or longer of intense work .
`` Even with that , the release Emergency Response process is n't over , '' Reavey said .
`` There is additional support to customers and additional refinement of our product development efforts . ''
Trend Micro urges IE users to heed precautionary advice from Microsoft , or avoid using the browsers , until the patches are applied .
The `` exploit '' is similar to one used recently to steal user names , passwords and other information from people playing online games in China , according to Trend Micro . |
27_4ecb.xml_13 | train | ent | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 0 | 0 | 0 | 9 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | <m> Microsoft </m> has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | Microsoft releases security update for Internet Explorer
<m> Microsoft </m> has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_10 | train | ent | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 24 | 24 | 150 | 155 | users | HUM16627778540077611 | user | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million <m> users </m> hacked . | Microsoft releases security update for Internet Explorer
Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million <m> users </m> hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_17 | train | ent | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 14 | 14 | 98 | 102 | that | NON16727620231965862 | that | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer <m> that </m> has seen the computers of at least two million users hacked . | Microsoft releases security update for Internet Explorer
Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer <m> that </m> has seen the computers of at least two million users hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_9 | train | ent | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 10 | 10 | 63 | 76 | vulnerability | NON16727620231965862 | vulnerability | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has released an emergency security update to fix the <m> vulnerability </m> in Internet Explorer that has seen the computers of at least two million users hacked . | Microsoft releases security update for Internet Explorer
Microsoft has released an emergency security update to fix the <m> vulnerability </m> in Internet Explorer that has seen the computers of at least two million users hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_11 | train | ent | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 12 | 13 | 80 | 97 | Internet Explorer | NON16628072497530110 | Internet | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has released an emergency security update to fix the vulnerability in <m> Internet Explorer </m> that has seen the computers of at least two million users hacked . | Microsoft releases security update for Internet Explorer
Microsoft has released an emergency security update to fix the vulnerability in <m> Internet Explorer </m> that has seen the computers of at least two million users hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_12 | train | ent | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 6 | 6 | 45 | 51 | update | NON16727641175459595 | update | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has released an emergency security <m> update </m> to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | Microsoft releases security update for Internet Explorer
Microsoft has released an emergency security <m> update </m> to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_16 | train | ent | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 18 | 18 | 116 | 125 | computers | NON16728230766371174 | computer | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the <m> computers </m> of at least two million users hacked . | Microsoft releases security update for Internet Explorer
Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the <m> computers </m> of at least two million users hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_18 | train | evt | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 25 | 25 | 156 | 162 | hacked | ACT16632565623246075 | hack | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users <m> hacked </m> . | Microsoft releases security update for Internet Explorer
Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users <m> hacked </m> .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_14 | train | evt | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 8 | 8 | 55 | 58 | fix | ACT16632539609441083 | fix | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has released an emergency security update to <m> fix </m> the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | Microsoft releases security update for Internet Explorer
Microsoft has released an emergency security update to <m> fix </m> the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_15 | train | evt | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 2 | 2 | 14 | 22 | released | ACT16632487083891659 | release | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has <m> released </m> an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | Microsoft releases security update for Internet Explorer
Microsoft has <m> released </m> an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_19 | train | evt | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 16 | 16 | 107 | 111 | seen | 10000001971 | see | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has <m> seen </m> the computers of at least two million users hacked . | Microsoft releases security update for Internet Explorer
Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has <m> seen </m> the computers of at least two million users hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_20 | train | evt | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 5 | 5 | 36 | 44 | security | 10000001972 | security | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has released an emergency <m> security </m> update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | Microsoft releases security update for Internet Explorer
Microsoft has released an emergency <m> security </m> update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_4ecb.xml_21 | train | evt | 27_4ecb.xml | 1 | Microsoft has released an emergency security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | 4 | 4 | 26 | 35 | emergency | 10000001973 | emergency | ['microsoft', 'release', 'emergency', 'security', 'update', 'fix', 'vulnerability', 'internet', 'explorer', 'see', 'computer', 'million', 'user', 'hack'] | Microsoft has released an <m> emergency </m> security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked . | Microsoft releases security update for Internet Explorer
Microsoft has released an <m> emergency </m> security update to fix the vulnerability in Internet Explorer that has seen the computers of at least two million users hacked .
The `` zero day '' flaw allows hackers to gain access to the computers of visitors to infected websites , jeopardising the security of passwords , bank details and other personal information .
It is believed that as many as 233,000 web pages have been affected .
Microsoft says its `` critical '' update will protect users .
Christopher Budd , of the software giant 's security centre , said the company `` encourages all Internet Explorer customers to test and deploy this update as soon as possible '' .
Mike Reavey , also from the security centre , said : `` Even with that , the release Emergency Response process is n't over .
There is additional support to customers and additional refinement of our product development efforts . ''
Microsoft has said that the flaw has been proven to exist only in version 7 of Internet Explorer , but that version 6 and the `` beta '' release of version 8 are also `` potentially vulnerable '' .
It has estimated that one in every 500 Windows users has been exposed to websites that attempt to exploit the flaw , and that the number of victims was increasing by 50 per cent every day .
Paul Ferguson , a researcher from the software security company Trend Micro , told the BBC that attacks were spreading `` like wildfire '' .
`` This vulnerability is being actively exploited by cyber-criminals and getting worse every day , '' Mr Ferguson said . |
27_8ecbplus.xml_15 | train | ent | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 12 | 12 | 71 | 73 | it | HUM16627702263331271 | it | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced <m> it </m> has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced <m> it </m> has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_1 | train | ent | 27_8ecbplus.xml | 1 | Microsoft rushes out security patch for Internet Explorer | 0 | 0 | 0 | 9 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'rush', 'security', 'patch', 'internet', 'explorer'] | <m> Microsoft </m> rushes out security patch for Internet Explorer | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
<m> Microsoft </m> rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_3 | train | ent | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 10 | 10 | 53 | 60 | company | HUM16627702263331271 | company | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the <m> company </m> announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the <m> company </m> announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_6 | train | ent | 27_8ecbplus.xml | 7 | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | 1 | 1 | 4 | 11 | company | HUM16627702263331271 | company | ['company', 'release', '"fix', 'it"', 'patch', '"cve', '2013', '3893', 'mshtml', 'shim', 'workaround"', 'plug', 'security', 'hole', 'currently', 'support', 'version', 'ie'] | The <m> company </m> has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The <m> company </m> has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_80 | train | ent | 27_8ecbplus.xml | 7 | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | 5 | 8 | 27 | 43 | "Fix - it" patch | NON16628128321821328 | patch | ['company', 'release', '"fix', 'it"', 'patch', '"cve', '2013', '3893', 'mshtml', 'shim', 'workaround"', 'plug', 'security', 'hole', 'currently', 'support', 'version', 'ie'] | The company has released a <m> "Fix - it" patch </m> , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a <m> "Fix - it" patch </m> , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_81 | train | ent | 27_8ecbplus.xml | 7 | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | 22 | 22 | 111 | 115 | hole | NON16628047448605797 | hole | ['company', 'release', '"fix', 'it"', 'patch', '"cve', '2013', '3893', 'mshtml', 'shim', 'workaround"', 'plug', 'security', 'hole', 'currently', 'support', 'version', 'ie'] | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security <m> hole </m> in all currently supported versions of IE . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security <m> hole </m> in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_82 | train | ent | 27_8ecbplus.xml | 7 | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | 27 | 27 | 143 | 151 | versions | NON16628062366463431 | version | ['company', 'release', '"fix', 'it"', 'patch', '"cve', '2013', '3893', 'mshtml', 'shim', 'workaround"', 'plug', 'security', 'hole', 'currently', 'support', 'version', 'ie'] | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported <m> versions </m> of IE . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported <m> versions </m> of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_83 | train | ent | 27_8ecbplus.xml | 7 | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | 29 | 29 | 155 | 157 | IE | NON16628072497530110 | IE | ['company', 'release', '"fix', 'it"', 'patch', '"cve', '2013', '3893', 'mshtml', 'shim', 'workaround"', 'plug', 'security', 'hole', 'currently', 'support', 'version', 'ie'] | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of <m> IE </m> . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of <m> IE </m> .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_89 | train | ent | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 23 | 23 | 128 | 135 | exploit | NON16628047448605797 | exploit | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an <m> exploit </m> that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an <m> exploit </m> that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_27 | train | ent | 27_8ecbplus.xml | 1 | Microsoft rushes out security patch for Internet Explorer | 4 | 4 | 30 | 35 | patch | NON16628128321821328 | patch | ['microsoft', 'rush', 'security', 'patch', 'internet', 'explorer'] | Microsoft rushes out security <m> patch </m> for Internet Explorer | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security <m> patch </m> for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_28 | train | ent | 27_8ecbplus.xml | 1 | Microsoft rushes out security patch for Internet Explorer | 6 | 7 | 40 | 57 | Internet Explorer | NON16628072497530110 | Internet | ['microsoft', 'rush', 'security', 'patch', 'internet', 'explorer'] | Microsoft rushes out security patch for <m> Internet Explorer </m> | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for <m> Internet Explorer </m>
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_68 | train | ent | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 18 | 18 | 103 | 108 | patch | NON16628128321821328 | patch | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an additional <m> patch </m> designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional <m> patch </m> designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_69 | train | ent | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 29 | 30 | 159 | 176 | Internet Explorer | NON16628072497530110 | Internet | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in <m> Internet Explorer </m> , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in <m> Internet Explorer </m> , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_39 | train | ent | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 39 | 39 | 211 | 214 | IE8 | NON16628082435245674 | IE8 | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on <m> IE8 </m> and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on <m> IE8 </m> and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_40 | train | ent | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 41 | 41 | 219 | 222 | IE9 | NON16628093839904536 | IE9 | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and <m> IE9 </m> . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and <m> IE9 </m> .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_17 | train | ent | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 2 | 3 | 14 | 23 | last week | 10000001974 | last | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened <m> last week </m> as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened <m> last week </m> as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_19 | train | ent | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 8 | 8 | 43 | 48 | today | TIM16629016021623094 | today | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but <m> today </m> the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but <m> today </m> the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_91 | train | ent | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 24 | 24 | 136 | 140 | that | NON16628047448605797 | that | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit <m> that </m> has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit <m> that </m> has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_73 | train | evt | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 27 | 27 | 150 | 155 | found | 10000001975 | find | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been <m> found </m> in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been <m> found </m> in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_44 | train | evt | 27_8ecbplus.xml | 7 | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | 3 | 3 | 16 | 24 | released | ACT16628380851866429 | release | ['company', 'release', '"fix', 'it"', 'patch', '"cve', '2013', '3893', 'mshtml', 'shim', 'workaround"', 'plug', 'security', 'hole', 'currently', 'support', 'version', 'ie'] | The company has <m> released </m> a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has <m> released </m> a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_78 | train | evt | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 19 | 19 | 109 | 117 | designed | 10000001976 | design | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an additional patch <m> designed </m> to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch <m> designed </m> to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_22 | train | evt | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 14 | 15 | 78 | 88 | rushed out | ACT16628380851866429 | rush | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has <m> rushed out </m> an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has <m> rushed out </m> an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_23 | train | evt | 27_8ecbplus.xml | 1 | Microsoft rushes out security patch for Internet Explorer | 1 | 2 | 10 | 20 | rushes out | ACT16628380851866429 | rush | ['microsoft', 'rush', 'security', 'patch', 'internet', 'explorer'] | Microsoft <m> rushes out </m> security patch for Internet Explorer | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft <m> rushes out </m> security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_32 | train | evt | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 21 | 21 | 121 | 124 | fix | ACT16628469504676387 | fix | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to <m> fix </m> an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to <m> fix </m> an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_33 | train | evt | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 35 | 35 | 192 | 196 | used | ACT16628282010133294 | use | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being <m> used </m> in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being <m> used </m> in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_34 | train | evt | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 37 | 37 | 200 | 207 | attacks | ACT16628483776494389 | attack | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in <m> attacks </m> on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in <m> attacks </m> on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_75 | train | evt | 27_8ecbplus.xml | 1 | Microsoft rushes out security patch for Internet Explorer | 3 | 3 | 21 | 29 | security | 10000001977 | security | ['microsoft', 'rush', 'security', 'patch', 'internet', 'explorer'] | Microsoft rushes out <m> security </m> patch for Internet Explorer | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out <m> security </m> patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_76 | train | evt | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 5 | 5 | 27 | 36 | scheduled | 10000001978 | schedule | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as <m> scheduled </m> , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as <m> scheduled </m> , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_77 | train | evt | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 17 | 17 | 92 | 102 | additional | 10000001979 | additional | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company announced it has rushed out an <m> additional </m> patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an <m> additional </m> patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_84 | train | evt | 27_8ecbplus.xml | 7 | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | 21 | 21 | 102 | 110 | security | 10000001980 | security | ['company', 'release', '"fix', 'it"', 'patch', '"cve', '2013', '3893', 'mshtml', 'shim', 'workaround"', 'plug', 'security', 'hole', 'currently', 'support', 'version', 'ie'] | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this <m> security </m> hole in all currently supported versions of IE . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this <m> security </m> hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_86 | train | evt | 27_8ecbplus.xml | 7 | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | 26 | 26 | 133 | 142 | supported | 10000001981 | support | ['company', 'release', '"fix', 'it"', 'patch', '"cve', '2013', '3893', 'mshtml', 'shim', 'workaround"', 'plug', 'security', 'hole', 'currently', 'support', 'version', 'ie'] | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently <m> supported </m> versions of IE . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently <m> supported </m> versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_90 | train | evt | 27_8ecbplus.xml | 7 | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE . | 19 | 19 | 92 | 96 | plug | ACT16628469504676387 | plug | ['company', 'release', '"fix', 'it"', 'patch', '"cve', '2013', '3893', 'mshtml', 'shim', 'workaround"', 'plug', 'security', 'hole', 'currently', 'support', 'version', 'ie'] | The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to <m> plug </m> this security hole in all currently supported versions of IE . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to <m> plug </m> this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_8ecbplus.xml_92 | train | evt | 27_8ecbplus.xml | 4 | That happened last week as scheduled , but today the company announced it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | 11 | 11 | 61 | 70 | announced | ACT16628926406902821 | announce | ['happen', 'week', 'schedule', 'today', 'company', 'announce', 'rush', 'additional', 'patch', 'design', 'fix', 'exploit', 'find', 'internet', 'explorer', 'attack', 'ie8', 'ie9'] | That happened last week as scheduled , but today the company <m> announced </m> it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 . | http : / / www . neowin . net / news / microsoft - rushes - out - security - patch - for - internet - explorer
Microsoft rushes out security patch for Internet Explorer
17 September 2013 - 21 : 29
Normally , Microsoft releases security bulletins for software products on the second Tuesday of each month .
That happened last week as scheduled , but today the company <m> announced </m> it has rushed out an additional patch designed to fix an exploit that has been found in Internet Explorer , and is being used in attacks on IE8 and IE9 .
In a post on its security response blog , Microsoft says the issue would allow a hacker to launch a remote code execution if a person surfs to a website using IE that contains malicious code .
The blog adds , "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9 , although the issue could potentially affect all supported versions . "
The company has released a "Fix - it" patch , "CVE - 2013 - 3893 MSHTML Shim Workaround" to plug this security hole in all currently supported versions of IE .
In addition , Microsoft recommends that users set their security settings on the web browser to "High" to block any ActiveX Controls and Active Scripting on websites .
It also recommends users set up IE so that it informs them ahead of time before running any Active Scripting features .
The company plans to release a full security patch that will be a more complete solution to this problem in the near future . |
27_7ecbplus.xml_1 | train | ent | 27_7ecbplus.xml | 1 | Microsoft to release patch for Internet Explorer | 0 | 0 | 0 | 9 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'release', 'patch', 'internet', 'explorer'] | <m> Microsoft </m> to release patch for Internet Explorer | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
<m> Microsoft </m> to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won β t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_2 | train | ent | 27_7ecbplus.xml | 4 | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | 0 | 0 | 0 | 9 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week'] | <m> Microsoft </m> will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
<m> Microsoft </m> will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won β t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_18 | train | ent | 27_7ecbplus.xml | 1 | Microsoft to release patch for Internet Explorer | 5 | 6 | 31 | 48 | Internet Explorer | NON16628072497530110 | Internet | ['microsoft', 'release', 'patch', 'internet', 'explorer'] | Microsoft to release patch for <m> Internet Explorer </m> | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for <m> Internet Explorer </m>
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won β t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_19 | train | ent | 27_7ecbplus.xml | 1 | Microsoft to release patch for Internet Explorer | 3 | 3 | 21 | 26 | patch | NON16628128321821328 | patch | ['microsoft', 'release', 'patch', 'internet', 'explorer'] | Microsoft to release <m> patch </m> for Internet Explorer | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release <m> patch </m> for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won β t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_20 | train | ent | 27_7ecbplus.xml | 2 | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . | 0 | 1 | 0 | 9 | 'The Fix' | NON16628128321821328 | 'the | ["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine'] | <m> 'The Fix' </m> will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
<m> 'The Fix' </m> will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won β t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_88 | train | ent | 27_7ecbplus.xml | 4 | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | 11 | 11 | 52 | 57 | patch | NON16628128321821328 | patch | ['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week'] | Microsoft will push out an out - of - cycle Windows <m> patch </m> to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows <m> patch </m> to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won β t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_89 | train | ent | 27_7ecbplus.xml | 2 | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . | 17 | 17 | 98 | 105 | machine | NON16627989353367163 | machine | ["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine'] | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows <m> machine </m> . . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows <m> machine </m> . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won β t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_90 | train | ent | 27_7ecbplus.xml | 2 | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . | 16 | 16 | 90 | 97 | Windows | 94 | Windows | ["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine'] | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a <m> Windows </m> machine . . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a <m> Windows </m> machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won β t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.