mention_id
stringlengths 12
20
| split
stringclasses 1
value | men_type
stringclasses 2
values | doc_id
stringclasses 574
values | sentence_id
stringclasses 24
values | sentence
stringlengths 22
366
| token_start
stringclasses 63
values | token_end
stringclasses 64
values | start_char
stringclasses 282
values | end_char
stringclasses 294
values | mention_text
stringlengths 1
102
| gold_cluster
stringlengths 1
20
| lemma
stringlengths 1
17
| sentence_tokens
stringlengths 18
347
| marked_sentence
stringlengths 31
375
| marked_doc
stringlengths 58
16.6k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
27_7ecbplus.xml_91 | train | ent | 27_7ecbplus.xml | 4 | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | 10 | 10 | 44 | 51 | Windows | 94 | Windows | ['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week'] | Microsoft will push out an out - of - cycle <m> Windows </m> patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle <m> Windows </m> patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_95 | train | ent | 27_7ecbplus.xml | 4 | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | 17 | 18 | 90 | 107 | Internet Explorer | NON16628072497530110 | internet | ['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week'] | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical <m> Internet Explorer </m> flaw revealed earlier this week . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical <m> Internet Explorer </m> flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_96 | train | ent | 27_7ecbplus.xml | 4 | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | 19 | 19 | 108 | 112 | flaw | NON16628047448605797 | flaw | ['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week'] | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer <m> flaw </m> revealed earlier this week . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer <m> flaw </m> revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_100 | train | ent | 27_7ecbplus.xml | 2 | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . | 5 | 5 | 24 | 37 | vulnerability | NON16628047448605797 | vulnerability | ["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine'] | 'The Fix' will remedy a <m> vulnerability </m> that allows an attacker to gain remote control of a Windows machine . . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a <m> vulnerability </m> that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_27 | train | ent | 27_7ecbplus.xml | 4 | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | 21 | 23 | 122 | 139 | earlier this week | 10000001982 | early | ['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week'] | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed <m> earlier this week </m> . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed <m> earlier this week </m> .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_102 | train | ent | 27_7ecbplus.xml | 2 | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . | 9 | 9 | 53 | 61 | attacker | HUM16627963455277878 | attacker | ["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine'] | 'The Fix' will remedy a vulnerability that allows an <m> attacker </m> to gain remote control of a Windows machine . . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an <m> attacker </m> to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_23 | train | evt | 27_7ecbplus.xml | 1 | Microsoft to release patch for Internet Explorer | 2 | 2 | 13 | 20 | release | ACT16628380851866429 | release | ['microsoft', 'release', 'patch', 'internet', 'explorer'] | Microsoft to <m> release </m> patch for Internet Explorer | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to <m> release </m> patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_24 | train | evt | 27_7ecbplus.xml | 2 | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . | 3 | 3 | 15 | 21 | remedy | ACT16628469504676387 | remedy | ["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine'] | 'The Fix' will <m> remedy </m> a vulnerability that allows an attacker to gain remote control of a Windows machine . . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will <m> remedy </m> a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_25 | train | evt | 27_7ecbplus.xml | 2 | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . | 11 | 11 | 65 | 69 | gain | ACT16628271421792378 | gain | ["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine'] | 'The Fix' will remedy a vulnerability that allows an attacker to <m> gain </m> remote control of a Windows machine . . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to <m> gain </m> remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_26 | train | evt | 27_7ecbplus.xml | 4 | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | 2 | 3 | 15 | 23 | push out | ACT16628380851866429 | push | ['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week'] | Microsoft will <m> push out </m> an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will <m> push out </m> an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_34 | train | evt | 27_7ecbplus.xml | 2 | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . | 7 | 7 | 43 | 49 | allows | 10000001983 | allow | ["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine'] | 'The Fix' will remedy a vulnerability that <m> allows </m> an attacker to gain remote control of a Windows machine . . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that <m> allows </m> an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_35 | train | evt | 27_7ecbplus.xml | 4 | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | 14 | 14 | 73 | 76 | fix | ACT16628469504676387 | fix | ['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week'] | Microsoft will push out an out - of - cycle Windows patch to temporarily <m> fix </m> the critical Internet Explorer flaw revealed earlier this week . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily <m> fix </m> the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_86 | train | evt | 27_7ecbplus.xml | 4 | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | 5 | 9 | 27 | 43 | out - of - cycle | 10000001984 | cycle | ['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week'] | Microsoft will push out an <m> out - of - cycle </m> Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an <m> out - of - cycle </m> Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_87 | train | evt | 27_7ecbplus.xml | 2 | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . | 12 | 12 | 70 | 76 | remote | 10000001985 | remote | ["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine'] | 'The Fix' will remedy a vulnerability that allows an attacker to gain <m> remote </m> control of a Windows machine . . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain <m> remote </m> control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_103 | train | evt | 27_7ecbplus.xml | 2 | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . | 13 | 13 | 77 | 84 | control | ACT16628292037757658 | control | ["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine'] | 'The Fix' will remedy a vulnerability that allows an attacker to gain remote <m> control </m> of a Windows machine . . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote <m> control </m> of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_7ecbplus.xml_104 | train | evt | 27_7ecbplus.xml | 4 | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . | 20 | 20 | 113 | 121 | revealed | ACT16628956656439146 | reveal | ['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week'] | Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw <m> revealed </m> earlier this week . | http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer
Microsoft to release patch for Internet Explorer
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
Wed , Sep 19 2012 at 11 : 47 AM
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw <m> revealed </m> earlier this week .
"While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 .
"The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote .
"It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available .
It won ’ t require a reboot of your computer .
"This Fix it will be available for everyone to download and install within the next few days , " she added .
Microsoft usually pushes out software updates and security patches on the second Tuesday of every month .
Out - of - cycle patches are reserved for the most serious flaws .
It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update .
Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications .
Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed .
The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user .
That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software .
The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 .
Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected .
Nor is Windows Server 2012 . |
27_2ecb.xml_11 | train | ent | 27_2ecb.xml | 2 | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | 0 | 0 | 0 | 9 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week'] | <m> Microsoft </m> today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | Microsoft Patches IE , But Security Issues Remain
As usual , the bad guys are ahead in the tug-of-war over security .
<m> Microsoft </m> today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address .
The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs .
By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult .
However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately .
Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement .
They have not been successful against systems where the patch has been applied , according to Budd .
Microsoft is hosting two Webcasts to address customer questions about the security bulletin .
The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada .
The Webcast will be available on demand after that .
According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth .
One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened .
This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 .
Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site .
Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com .
They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code .
An IFrame is an HTML element that lets users embed an HTML document inside another HTML document .
The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 .
`` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said .
`` It 's a very Web 2.0 way of spreading malware . '' |
27_2ecb.xml_17 | train | ent | 27_2ecb.xml | 2 | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | 8 | 9 | 48 | 65 | Internet Explorer | NON16628072497530110 | Internet | ['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week'] | Microsoft today released a patch for the latest <m> Internet Explorer </m> ( IE ) browser vulnerability that has been in the news since last week . | Microsoft Patches IE , But Security Issues Remain
As usual , the bad guys are ahead in the tug-of-war over security .
Microsoft today released a patch for the latest <m> Internet Explorer </m> ( IE ) browser vulnerability that has been in the news since last week .
However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address .
The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs .
By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult .
However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately .
Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement .
They have not been successful against systems where the patch has been applied , according to Budd .
Microsoft is hosting two Webcasts to address customer questions about the security bulletin .
The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada .
The Webcast will be available on demand after that .
According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth .
One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened .
This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 .
Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site .
Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com .
They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code .
An IFrame is an HTML element that lets users embed an HTML document inside another HTML document .
The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 .
`` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said .
`` It 's a very Web 2.0 way of spreading malware . '' |
27_2ecb.xml_9 | train | ent | 27_2ecb.xml | 2 | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | 4 | 4 | 27 | 32 | patch | NON16727641175459595 | patch | ['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week'] | Microsoft today released a <m> patch </m> for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | Microsoft Patches IE , But Security Issues Remain
As usual , the bad guys are ahead in the tug-of-war over security .
Microsoft today released a <m> patch </m> for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address .
The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs .
By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult .
However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately .
Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement .
They have not been successful against systems where the patch has been applied , according to Budd .
Microsoft is hosting two Webcasts to address customer questions about the security bulletin .
The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada .
The Webcast will be available on demand after that .
According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth .
One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened .
This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 .
Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site .
Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com .
They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code .
An IFrame is an HTML element that lets users embed an HTML document inside another HTML document .
The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 .
`` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said .
`` It 's a very Web 2.0 way of spreading malware . '' |
27_2ecb.xml_14 | train | ent | 27_2ecb.xml | 2 | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | 14 | 14 | 81 | 94 | vulnerability | NON16727620231965862 | vulnerability | ['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week'] | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser <m> vulnerability </m> that has been in the news since last week . | Microsoft Patches IE , But Security Issues Remain
As usual , the bad guys are ahead in the tug-of-war over security .
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser <m> vulnerability </m> that has been in the news since last week .
However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address .
The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs .
By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult .
However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately .
Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement .
They have not been successful against systems where the patch has been applied , according to Budd .
Microsoft is hosting two Webcasts to address customer questions about the security bulletin .
The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada .
The Webcast will be available on demand after that .
According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth .
One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened .
This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 .
Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site .
Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com .
They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code .
An IFrame is an HTML element that lets users embed an HTML document inside another HTML document .
The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 .
`` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said .
`` It 's a very Web 2.0 way of spreading malware . '' |
27_2ecb.xml_15 | train | ent | 27_2ecb.xml | 2 | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | 15 | 15 | 95 | 99 | that | NON16727620231965862 | that | ['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week'] | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability <m> that </m> has been in the news since last week . | Microsoft Patches IE , But Security Issues Remain
As usual , the bad guys are ahead in the tug-of-war over security .
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability <m> that </m> has been in the news since last week .
However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address .
The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs .
By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult .
However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately .
Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement .
They have not been successful against systems where the patch has been applied , according to Budd .
Microsoft is hosting two Webcasts to address customer questions about the security bulletin .
The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada .
The Webcast will be available on demand after that .
According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth .
One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened .
This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 .
Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site .
Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com .
They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code .
An IFrame is an HTML element that lets users embed an HTML document inside another HTML document .
The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 .
`` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said .
`` It 's a very Web 2.0 way of spreading malware . '' |
27_2ecb.xml_13 | train | ent | 27_2ecb.xml | 2 | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | 1 | 1 | 10 | 15 | today | TIM27376179174463069 | today | ['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week'] | Microsoft <m> today </m> released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | Microsoft Patches IE , But Security Issues Remain
As usual , the bad guys are ahead in the tug-of-war over security .
Microsoft <m> today </m> released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address .
The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs .
By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult .
However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately .
Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement .
They have not been successful against systems where the patch has been applied , according to Budd .
Microsoft is hosting two Webcasts to address customer questions about the security bulletin .
The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada .
The Webcast will be available on demand after that .
According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth .
One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened .
This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 .
Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site .
Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com .
They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code .
An IFrame is an HTML element that lets users embed an HTML document inside another HTML document .
The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 .
`` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said .
`` It 's a very Web 2.0 way of spreading malware . '' |
27_2ecb.xml_16 | train | ent | 27_2ecb.xml | 2 | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | 21 | 23 | 121 | 136 | since last week | 10000001986 | since | ['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week'] | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news <m> since last week </m> . | Microsoft Patches IE , But Security Issues Remain
As usual , the bad guys are ahead in the tug-of-war over security .
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news <m> since last week </m> .
However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address .
The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs .
By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult .
However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately .
Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement .
They have not been successful against systems where the patch has been applied , according to Budd .
Microsoft is hosting two Webcasts to address customer questions about the security bulletin .
The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada .
The Webcast will be available on demand after that .
According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth .
One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened .
This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 .
Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site .
Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com .
They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code .
An IFrame is an HTML element that lets users embed an HTML document inside another HTML document .
The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 .
`` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said .
`` It 's a very Web 2.0 way of spreading malware . '' |
27_2ecb.xml_10 | train | evt | 27_2ecb.xml | 2 | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | 20 | 20 | 116 | 120 | news | 10000001987 | news | ['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week'] | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the <m> news </m> since last week . | Microsoft Patches IE , But Security Issues Remain
As usual , the bad guys are ahead in the tug-of-war over security .
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the <m> news </m> since last week .
However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address .
The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs .
By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult .
However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately .
Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement .
They have not been successful against systems where the patch has been applied , according to Budd .
Microsoft is hosting two Webcasts to address customer questions about the security bulletin .
The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada .
The Webcast will be available on demand after that .
According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth .
One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened .
This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 .
Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site .
Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com .
They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code .
An IFrame is an HTML element that lets users embed an HTML document inside another HTML document .
The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 .
`` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said .
`` It 's a very Web 2.0 way of spreading malware . '' |
27_2ecb.xml_12 | train | evt | 27_2ecb.xml | 2 | Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | 2 | 2 | 16 | 24 | released | ACT16632487083891659 | release | ['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week'] | Microsoft today <m> released </m> a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . | Microsoft Patches IE , But Security Issues Remain
As usual , the bad guys are ahead in the tug-of-war over security .
Microsoft today <m> released </m> a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address .
The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs .
By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult .
However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately .
Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement .
They have not been successful against systems where the patch has been applied , according to Budd .
Microsoft is hosting two Webcasts to address customer questions about the security bulletin .
The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada .
The Webcast will be available on demand after that .
According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth .
One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened .
This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 .
Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site .
Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com .
They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code .
An IFrame is an HTML element that lets users embed an HTML document inside another HTML document .
The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 .
`` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said .
`` It 's a very Web 2.0 way of spreading malware . '' |
27_6ecbplus.xml_1 | train | ent | 27_6ecbplus.xml | 1 | Microsoft : IE Zero Day Flaw Affects All Versions | 0 | 0 | 0 | 9 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'ie', 'zero', 'day', 'flaw', 'affect', 'version'] | <m> Microsoft </m> : IE Zero Day Flaw Affects All Versions | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
<m> Microsoft </m> : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_2 | train | ent | 27_6ecbplus.xml | 2 | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | 0 | 0 | 0 | 9 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser'] | <m> Microsoft </m> said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
<m> Microsoft </m> said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_3 | train | ent | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 1 | 1 | 4 | 11 | company | HUM16627702263331271 | company | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The <m> company </m> said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The <m> company </m> said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_6 | train | ent | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 3 | 3 | 17 | 19 | it | HUM16627702263331271 | it | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said <m> it </m> is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said <m> it </m> is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_7 | train | ent | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 20 | 20 | 100 | 102 | it | HUM16627702263331271 | it | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is working on an official patch to plug the security hole , but in the meantime <m> it </m> has released a stopgap fix to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime <m> it </m> has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_9 | train | ent | 27_6ecbplus.xml | 2 | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | 4 | 4 | 26 | 35 | attackers | HUM16627963455277878 | attacker | ['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser'] | Microsoft said today that <m> attackers </m> are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that <m> attackers </m> are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_10 | train | ent | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 30 | 30 | 155 | 164 | customers | HUM16627778540077611 | customer | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected <m> customers </m> . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected <m> customers </m> .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_16 | train | ent | 27_6ecbplus.xml | 2 | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | 19 | 20 | 131 | 148 | Internet Explorer | NON16628072497530110 | Internet | ['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser'] | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its <m> Internet Explorer </m> Web browser . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its <m> Internet Explorer </m> Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_23 | train | ent | 27_6ecbplus.xml | 1 | Microsoft : IE Zero Day Flaw Affects All Versions | 8 | 8 | 41 | 49 | Versions | NON16628062366463431 | version | ['microsoft', 'ie', 'zero', 'day', 'flaw', 'affect', 'version'] | Microsoft : IE Zero Day Flaw Affects All <m> Versions </m> | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All <m> Versions </m>
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_57 | train | ent | 27_6ecbplus.xml | 2 | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | 16 | 16 | 115 | 123 | versions | NON16628062366463431 | version | ['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser'] | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported <m> versions </m> of its Internet Explorer Web browser . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported <m> versions </m> of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_24 | train | ent | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 9 | 9 | 46 | 51 | patch | 10000001988 | patch | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is working on an official <m> patch </m> to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official <m> patch </m> to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_59 | train | ent | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 14 | 14 | 73 | 77 | hole | NON16628047448605797 | hole | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is working on an official patch to plug the security <m> hole </m> , but in the meantime it has released a stopgap fix to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security <m> hole </m> , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_25 | train | ent | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 25 | 25 | 126 | 129 | fix | NON16628128321821328 | fix | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap <m> fix </m> to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap <m> fix </m> to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_63 | train | ent | 27_6ecbplus.xml | 1 | Microsoft : IE Zero Day Flaw Affects All Versions | 2 | 2 | 12 | 14 | IE | NON16628072497530110 | IE | ['microsoft', 'ie', 'zero', 'day', 'flaw', 'affect', 'version'] | Microsoft : <m> IE </m> Zero Day Flaw Affects All Versions | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : <m> IE </m> Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_66 | train | ent | 27_6ecbplus.xml | 2 | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | 12 | 12 | 84 | 97 | vulnerability | NON16628047448605797 | vulnerability | ['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser'] | Microsoft said today that attackers are exploiting a previously unknown , unpatched <m> vulnerability </m> in all supported versions of its Internet Explorer Web browser . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched <m> vulnerability </m> in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_8 | train | ent | 27_6ecbplus.xml | 2 | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | 2 | 2 | 15 | 20 | today | 10000001989 | today | ['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser'] | Microsoft said <m> today </m> that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said <m> today </m> that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_69 | train | ent | 27_6ecbplus.xml | 1 | Microsoft : IE Zero Day Flaw Affects All Versions | 3 | 5 | 15 | 28 | Zero Day Flaw | NON16628047448605797 | Zero | ['microsoft', 'ie', 'zero', 'day', 'flaw', 'affect', 'version'] | Microsoft : IE <m> Zero Day Flaw </m> Affects All Versions | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE <m> Zero Day Flaw </m> Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_34 | train | evt | 27_6ecbplus.xml | 2 | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | 6 | 6 | 40 | 50 | exploiting | ACT16628282010133294 | exploit | ['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser'] | Microsoft said today that attackers are <m> exploiting </m> a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are <m> exploiting </m> a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_35 | train | evt | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 5 | 6 | 23 | 33 | working on | ACT16628434506216499 | work | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is <m> working on </m> an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is <m> working on </m> an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_36 | train | evt | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 11 | 11 | 55 | 59 | plug | ACT16628469504676387 | plug | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is working on an official patch to <m> plug </m> the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to <m> plug </m> the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_37 | train | evt | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 22 | 22 | 107 | 115 | released | ACT16628380851866429 | release | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is working on an official patch to plug the security hole , but in the meantime it has <m> released </m> a stopgap fix to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has <m> released </m> a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_38 | train | evt | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 28 | 28 | 138 | 145 | protect | ACT16628446210704189 | protect | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help <m> protect </m> affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help <m> protect </m> affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_29 | train | evt | 27_6ecbplus.xml | 2 | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | 1 | 1 | 10 | 14 | said | ACT16628911741694920 | say | ['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser'] | Microsoft <m> said </m> today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft <m> said </m> today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_30 | train | evt | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 2 | 2 | 12 | 16 | said | 10000001990 | say | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company <m> said </m> it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company <m> said </m> it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_54 | train | evt | 27_6ecbplus.xml | 2 | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | 11 | 11 | 74 | 83 | unpatched | ACT16628577311223281 | unpatched | ['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser'] | Microsoft said today that attackers are exploiting a previously unknown , <m> unpatched </m> vulnerability in all supported versions of its Internet Explorer Web browser . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , <m> unpatched </m> vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_55 | train | evt | 27_6ecbplus.xml | 2 | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | 15 | 15 | 105 | 114 | supported | 10000001991 | support | ['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser'] | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all <m> supported </m> versions of its Internet Explorer Web browser . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all <m> supported </m> versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_60 | train | evt | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 24 | 24 | 118 | 125 | stopgap | 10000001992 | stopgap | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a <m> stopgap </m> fix to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a <m> stopgap </m> fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_61 | train | evt | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 13 | 13 | 64 | 72 | security | 10000001993 | security | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is working on an official patch to plug the <m> security </m> hole , but in the meantime it has released a stopgap fix to help protect affected customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the <m> security </m> hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_39 | train | evt | 27_6ecbplus.xml | 3 | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . | 29 | 29 | 146 | 154 | affected | 10000001994 | affected | ['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer'] | The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect <m> affected </m> customers . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect <m> affected </m> customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_67 | train | evt | 27_6ecbplus.xml | 2 | Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | 9 | 9 | 64 | 71 | unknown | NEG16628966259122954 | unknown | ['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser'] | Microsoft said today that attackers are exploiting a previously <m> unknown </m> , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw Affects All Versions
Microsoft said today that attackers are exploiting a previously <m> unknown </m> , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_6ecbplus.xml_68 | train | evt | 27_6ecbplus.xml | 1 | Microsoft : IE Zero Day Flaw Affects All Versions | 6 | 6 | 29 | 36 | Affects | ACT28452315024913912 | affect | ['microsoft', 'ie', 'zero', 'day', 'flaw', 'affect', 'version'] | Microsoft : IE Zero Day Flaw <m> Affects </m> All Versions | http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions /
Microsoft : IE Zero Day Flaw <m> Affects </m> All Versions
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser .
According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site .
The Fix It solution is available from this link .
To apply it , click the Fix It icon above the Fix This Problem link .
Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update .
Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only .
In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab .
The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use . |
27_13ecb.xml_42 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 0 | 0 | 0 | 9 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | <m> Microsoft </m> today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
<m> Microsoft </m> today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_43 | train | ent | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 4 | 4 | 18 | 27 | Microsoft | HUM16627702263331271 | Microsoft | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which <m> Microsoft </m> dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which <m> Microsoft </m> dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_44 | train | ent | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 13 | 13 | 82 | 91 | Microsoft | HUM16627702263331271 | Microsoft | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that <m> Microsoft </m> says already has been used to attack more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that <m> Microsoft </m> says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_32 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 17 | 17 | 103 | 106 | its | HUM16627702263331271 | its | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security hole present in all versions of <m> its </m> Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of <m> its </m> Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_41 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 26 | 26 | 151 | 158 | hackers | HUM16627963455277878 | hacker | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that <m> hackers </m> have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that <m> hackers </m> have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_49 | train | ent | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 26 | 26 | 157 | 162 | users | HUM16627778540077611 | user | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows <m> users </m> . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows <m> users </m> .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_50 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 37 | 37 | 219 | 224 | users | HUM16627778540077611 | user | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows <m> users </m> . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows <m> users </m> .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_30 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 20 | 20 | 125 | 128 | Web | 10000001995 | web | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer <m> Web </m> browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer <m> Web </m> browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_35 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 24 | 24 | 141 | 145 | flaw | NON16727620231965862 | flaw | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a <m> flaw </m> that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a <m> flaw </m> that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_36 | train | ent | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 11 | 11 | 63 | 76 | vulnerability | NON16727620231965862 | vulnerability | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft dubbed MS08-078 , fixes a security <m> vulnerability </m> that Microsoft says already has been used to attack more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security <m> vulnerability </m> that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_37 | train | ent | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 12 | 12 | 77 | 81 | that | NON16727620231965862 | that | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability <m> that </m> Microsoft says already has been used to attack more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability <m> that </m> Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_38 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 32 | 32 | 189 | 193 | data | 10000001996 | datum | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal <m> data </m> from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal <m> data </m> from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_39 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 15 | 15 | 91 | 99 | versions | NON16728120065014833 | version | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security hole present in all <m> versions </m> of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all <m> versions </m> of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_40 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 18 | 19 | 107 | 124 | Internet Explorer | NON16628072497530110 | Internet | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its <m> Internet Explorer </m> Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its <m> Internet Explorer </m> Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_51 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 5 | 5 | 36 | 42 | update | NON16727641175459595 | update | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency <m> update </m> to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency <m> update </m> to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_52 | train | ent | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 1 | 1 | 4 | 9 | patch | NON16727641175459595 | patch | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The <m> patch </m> , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The <m> patch </m> , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_53 | train | ent | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 6 | 6 | 35 | 43 | MS08-078 | NON16727641175459595 | ms08-078 | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft dubbed <m> MS08-078 </m> , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed <m> MS08-078 </m> , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_54 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 36 | 36 | 211 | 218 | Windows | NON16759636276543635 | Windows | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of <m> Windows </m> users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of <m> Windows </m> users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_55 | train | ent | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 25 | 25 | 149 | 156 | Windows | NON16759636276543635 | Windows | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million <m> Windows </m> users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million <m> Windows </m> users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_34 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 11 | 11 | 71 | 75 | hole | NON16727620231965862 | hole | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security <m> hole </m> present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security <m> hole </m> present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_27 | train | ent | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 1 | 1 | 10 | 15 | today | TIM27376179174463069 | today | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft <m> today </m> issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft <m> today </m> issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_45 | train | evt | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 29 | 29 | 169 | 179 | leveraging | ACT16759694191093666 | leverage | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been <m> leveraging </m> to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been <m> leveraging </m> to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_46 | train | evt | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 18 | 18 | 114 | 118 | used | ACT16759694191093666 | use | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been <m> used </m> to attack more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been <m> used </m> to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_48 | train | evt | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 20 | 20 | 122 | 128 | attack | ACT16759674029446388 | attack | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to <m> attack </m> more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to <m> attack </m> more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_59 | train | evt | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 5 | 5 | 28 | 34 | dubbed | 10000001997 | dub | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft <m> dubbed </m> MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft <m> dubbed </m> MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_28 | train | evt | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 7 | 7 | 46 | 50 | plug | ACT16632539609441083 | plug | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to <m> plug </m> a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to <m> plug </m> a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_29 | train | evt | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 8 | 8 | 46 | 51 | fixes | ACT16632539609441083 | fix | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft dubbed MS08-078 , <m> fixes </m> a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , <m> fixes </m> a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_31 | train | evt | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 31 | 31 | 183 | 188 | steal | 10000001998 | steal | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to <m> steal </m> data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to <m> steal </m> data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_33 | train | evt | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 2 | 2 | 16 | 22 | issued | ACT16632487083891659 | issue | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today <m> issued </m> an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today <m> issued </m> an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_47 | train | evt | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 14 | 14 | 92 | 96 | says | 10000001999 | say | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft <m> says </m> already has been used to attack more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft <m> says </m> already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_56 | train | evt | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 10 | 10 | 62 | 70 | security | 10000002000 | security | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an emergency update to plug a critical <m> security </m> hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical <m> security </m> hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_57 | train | evt | 27_13ecb.xml | 1 | Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | 4 | 4 | 26 | 35 | emergency | 10000002001 | emergency | ['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user'] | Microsoft today issued an <m> emergency </m> update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an <m> emergency </m> update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_13ecb.xml_58 | train | evt | 27_13ecb.xml | 2 | The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | 10 | 10 | 54 | 62 | security | 10000002002 | security | ['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user'] | The patch , which Microsoft dubbed MS08-078 , fixes a <m> security </m> vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . | Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
The patch , which Microsoft dubbed MS08-078 , fixes a <m> security </m> vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer .
Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw .
Additionally , it said the number of victims was increasing at a rate of 50 percent daily .
Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online .
`` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle .
This is an urgent update .
If you use Windows , apply this patch now .
Windows users can download the fix at Windows Update , or by enabling Automatic Updates . |
27_8ecb.xml_28 | train | ent | 27_8ecb.xml | 0 | Microsoft issues emergency IE patch as attacks escalate | 0 | 0 | 0 | 9 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'issue', 'emergency', 'ie', 'patch', 'attack', 'escalate'] | <m> Microsoft </m> issues emergency IE patch as attacks escalate | <m> Microsoft </m> issues emergency IE patch as attacks escalate
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites .
There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign .
A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works .
Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit .
Once installed , the software steals login credentials for online games .
Attack strings in separate SQL injections include 17gamo.com/1.js .
Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here .
`` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense .
The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE .
This is only the second time in 18 months that Microsoft has issued an unscheduled update .
Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning .
Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu .
The patch can also be downloaded directly here .
Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez . |
27_8ecb.xml_29 | train | ent | 27_8ecb.xml | 1 | Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . | 0 | 0 | 0 | 9 | Microsoft | HUM16627702263331271 | Microsoft | ['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage'] | <m> Microsoft </m> has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . | Microsoft issues emergency IE patch as attacks escalate
<m> Microsoft </m> has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites .
There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign .
A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works .
Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit .
Once installed , the software steals login credentials for online games .
Attack strings in separate SQL injections include 17gamo.com/1.js .
Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here .
`` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense .
The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE .
This is only the second time in 18 months that Microsoft has issued an unscheduled update .
Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning .
Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu .
The patch can also be downloaded directly here .
Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez . |
27_8ecb.xml_27 | train | ent | 27_8ecb.xml | 1 | Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . | 13 | 13 | 82 | 92 | miscreants | HUM16627963455277878 | miscreant | ['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage'] | Microsoft has issued a rare emergency update for its Internet Explorer browser as <m> miscreants </m> stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . | Microsoft issues emergency IE patch as attacks escalate
Microsoft has issued a rare emergency update for its Internet Explorer browser as <m> miscreants </m> stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites .
There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign .
A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works .
Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit .
Once installed , the software steals login credentials for online games .
Attack strings in separate SQL injections include 17gamo.com/1.js .
Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here .
`` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense .
The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE .
This is only the second time in 18 months that Microsoft has issued an unscheduled update .
Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning .
Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu .
The patch can also be downloaded directly here .
Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez . |
27_8ecb.xml_22 | train | ent | 27_8ecb.xml | 1 | Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . | 25 | 25 | 166 | 174 | webpages | 10000002003 | webpage | ['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage'] | Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of <m> webpages </m> . | Microsoft issues emergency IE patch as attacks escalate
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of <m> webpages </m> .
In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites .
There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign .
A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works .
Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit .
Once installed , the software steals login credentials for online games .
Attack strings in separate SQL injections include 17gamo.com/1.js .
Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here .
`` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense .
The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE .
This is only the second time in 18 months that Microsoft has issued an unscheduled update .
Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning .
Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu .
The patch can also be downloaded directly here .
Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez . |
27_8ecb.xml_32 | train | ent | 27_8ecb.xml | 1 | Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . | 9 | 10 | 53 | 70 | Internet Explorer | NON16628072497530110 | Internet | ['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage'] | Microsoft has issued a rare emergency update for its <m> Internet Explorer </m> browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . | Microsoft issues emergency IE patch as attacks escalate
Microsoft has issued a rare emergency update for its <m> Internet Explorer </m> browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites .
There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign .
A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works .
Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit .
Once installed , the software steals login credentials for online games .
Attack strings in separate SQL injections include 17gamo.com/1.js .
Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here .
`` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense .
The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE .
This is only the second time in 18 months that Microsoft has issued an unscheduled update .
Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning .
Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu .
The patch can also be downloaded directly here .
Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez . |
27_8ecb.xml_36 | train | ent | 27_8ecb.xml | 0 | Microsoft issues emergency IE patch as attacks escalate | 3 | 3 | 27 | 29 | IE | NON16628072497530110 | IE | ['microsoft', 'issue', 'emergency', 'ie', 'patch', 'attack', 'escalate'] | Microsoft issues emergency <m> IE </m> patch as attacks escalate | Microsoft issues emergency <m> IE </m> patch as attacks escalate
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites .
There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign .
A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works .
Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit .
Once installed , the software steals login credentials for online games .
Attack strings in separate SQL injections include 17gamo.com/1.js .
Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here .
`` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense .
The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE .
This is only the second time in 18 months that Microsoft has issued an unscheduled update .
Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning .
Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu .
The patch can also be downloaded directly here .
Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez . |
27_8ecb.xml_19 | train | ent | 27_8ecb.xml | 1 | Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . | 19 | 19 | 124 | 137 | vulnerability | NON16727620231965862 | vulnerability | ['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage'] | Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a <m> vulnerability </m> on hundreds of thousands of webpages . | Microsoft issues emergency IE patch as attacks escalate
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a <m> vulnerability </m> on hundreds of thousands of webpages .
In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites .
There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign .
A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works .
Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit .
Once installed , the software steals login credentials for online games .
Attack strings in separate SQL injections include 17gamo.com/1.js .
Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here .
`` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense .
The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE .
This is only the second time in 18 months that Microsoft has issued an unscheduled update .
Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning .
Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu .
The patch can also be downloaded directly here .
Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez . |
27_8ecb.xml_20 | train | ent | 27_8ecb.xml | 0 | Microsoft issues emergency IE patch as attacks escalate | 4 | 4 | 30 | 35 | patch | NON16727641175459595 | patch | ['microsoft', 'issue', 'emergency', 'ie', 'patch', 'attack', 'escalate'] | Microsoft issues emergency IE <m> patch </m> as attacks escalate | Microsoft issues emergency IE <m> patch </m> as attacks escalate
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites .
There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign .
A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works .
Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit .
Once installed , the software steals login credentials for online games .
Attack strings in separate SQL injections include 17gamo.com/1.js .
Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here .
`` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense .
The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE .
This is only the second time in 18 months that Microsoft has issued an unscheduled update .
Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning .
Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu .
The patch can also be downloaded directly here .
Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez . |
27_8ecb.xml_21 | train | ent | 27_8ecb.xml | 1 | Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . | 6 | 6 | 38 | 44 | update | NON16727641175459595 | update | ['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage'] | Microsoft has issued a rare emergency <m> update </m> for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . | Microsoft issues emergency IE patch as attacks escalate
Microsoft has issued a rare emergency <m> update </m> for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites .
There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign .
A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works .
Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit .
Once installed , the software steals login credentials for online games .
Attack strings in separate SQL injections include 17gamo.com/1.js .
Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here .
`` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense .
The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE .
This is only the second time in 18 months that Microsoft has issued an unscheduled update .
Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning .
Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu .
The patch can also be downloaded directly here .
Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez . |
27_8ecb.xml_30 | train | evt | 27_8ecb.xml | 0 | Microsoft issues emergency IE patch as attacks escalate | 6 | 6 | 39 | 46 | attacks | ACT16759674029446388 | attack | ['microsoft', 'issue', 'emergency', 'ie', 'patch', 'attack', 'escalate'] | Microsoft issues emergency IE patch as <m> attacks </m> escalate | Microsoft issues emergency IE patch as <m> attacks </m> escalate
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites .
There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign .
A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works .
Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit .
Once installed , the software steals login credentials for online games .
Attack strings in separate SQL injections include 17gamo.com/1.js .
Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here .
`` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense .
The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE .
This is only the second time in 18 months that Microsoft has issued an unscheduled update .
Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning .
Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu .
The patch can also be downloaded directly here .
Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez . |
27_8ecb.xml_31 | train | evt | 27_8ecb.xml | 1 | Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . | 16 | 16 | 104 | 111 | attacks | ACT16759674029446388 | attack | ['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage'] | Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up <m> attacks </m> targeting a vulnerability on hundreds of thousands of webpages . | Microsoft issues emergency IE patch as attacks escalate
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up <m> attacks </m> targeting a vulnerability on hundreds of thousands of webpages .
In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites .
There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign .
A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works .
Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit .
Once installed , the software steals login credentials for online games .
Attack strings in separate SQL injections include 17gamo.com/1.js .
Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here .
`` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense .
The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE .
This is only the second time in 18 months that Microsoft has issued an unscheduled update .
Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning .
Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu .
The patch can also be downloaded directly here .
Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez . |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.