mention_id
stringlengths
12
20
split
stringclasses
1 value
men_type
stringclasses
2 values
doc_id
stringclasses
574 values
sentence_id
stringclasses
24 values
sentence
stringlengths
22
366
token_start
stringclasses
63 values
token_end
stringclasses
64 values
start_char
stringclasses
282 values
end_char
stringclasses
294 values
mention_text
stringlengths
1
102
gold_cluster
stringlengths
1
20
lemma
stringlengths
1
17
sentence_tokens
stringlengths
18
347
marked_sentence
stringlengths
31
375
marked_doc
stringlengths
58
16.6k
27_7ecbplus.xml_91
train
ent
27_7ecbplus.xml
4
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
10
10
44
51
Windows
94
Windows
['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week']
Microsoft will push out an out - of - cycle <m> Windows </m> patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle <m> Windows </m> patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_95
train
ent
27_7ecbplus.xml
4
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
17
18
90
107
Internet Explorer
NON16628072497530110
internet
['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week']
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical <m> Internet Explorer </m> flaw revealed earlier this week .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical <m> Internet Explorer </m> flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_96
train
ent
27_7ecbplus.xml
4
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
19
19
108
112
flaw
NON16628047448605797
flaw
['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week']
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer <m> flaw </m> revealed earlier this week .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer <m> flaw </m> revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_100
train
ent
27_7ecbplus.xml
2
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
5
5
24
37
vulnerability
NON16628047448605797
vulnerability
["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine']
'The Fix' will remedy a <m> vulnerability </m> that allows an attacker to gain remote control of a Windows machine . .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a <m> vulnerability </m> that allows an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_27
train
ent
27_7ecbplus.xml
4
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
21
23
122
139
earlier this week
10000001982
early
['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week']
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed <m> earlier this week </m> .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed <m> earlier this week </m> . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_102
train
ent
27_7ecbplus.xml
2
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
9
9
53
61
attacker
HUM16627963455277878
attacker
["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine']
'The Fix' will remedy a vulnerability that allows an <m> attacker </m> to gain remote control of a Windows machine . .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an <m> attacker </m> to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_23
train
evt
27_7ecbplus.xml
1
Microsoft to release patch for Internet Explorer
2
2
13
20
release
ACT16628380851866429
release
['microsoft', 'release', 'patch', 'internet', 'explorer']
Microsoft to <m> release </m> patch for Internet Explorer
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to <m> release </m> patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_24
train
evt
27_7ecbplus.xml
2
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
3
3
15
21
remedy
ACT16628469504676387
remedy
["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine']
'The Fix' will <m> remedy </m> a vulnerability that allows an attacker to gain remote control of a Windows machine . .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will <m> remedy </m> a vulnerability that allows an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_25
train
evt
27_7ecbplus.xml
2
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
11
11
65
69
gain
ACT16628271421792378
gain
["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine']
'The Fix' will remedy a vulnerability that allows an attacker to <m> gain </m> remote control of a Windows machine . .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to <m> gain </m> remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_26
train
evt
27_7ecbplus.xml
4
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
2
3
15
23
push out
ACT16628380851866429
push
['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week']
Microsoft will <m> push out </m> an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will <m> push out </m> an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_34
train
evt
27_7ecbplus.xml
2
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
7
7
43
49
allows
10000001983
allow
["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine']
'The Fix' will remedy a vulnerability that <m> allows </m> an attacker to gain remote control of a Windows machine . .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that <m> allows </m> an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_35
train
evt
27_7ecbplus.xml
4
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
14
14
73
76
fix
ACT16628469504676387
fix
['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week']
Microsoft will push out an out - of - cycle Windows patch to temporarily <m> fix </m> the critical Internet Explorer flaw revealed earlier this week .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily <m> fix </m> the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_86
train
evt
27_7ecbplus.xml
4
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
5
9
27
43
out - of - cycle
10000001984
cycle
['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week']
Microsoft will push out an <m> out - of - cycle </m> Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an <m> out - of - cycle </m> Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_87
train
evt
27_7ecbplus.xml
2
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
12
12
70
76
remote
10000001985
remote
["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine']
'The Fix' will remedy a vulnerability that allows an attacker to gain <m> remote </m> control of a Windows machine . .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to gain <m> remote </m> control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_103
train
evt
27_7ecbplus.xml
2
'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . .
13
13
77
84
control
ACT16628292037757658
control
["'the", "fix'", 'remedy', 'vulnerability', 'allow', 'attacker', 'gain', 'remote', 'control', 'windows', 'machine']
'The Fix' will remedy a vulnerability that allows an attacker to gain remote <m> control </m> of a Windows machine . .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to gain remote <m> control </m> of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_7ecbplus.xml_104
train
evt
27_7ecbplus.xml
4
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw revealed earlier this week .
20
20
113
121
revealed
ACT16628956656439146
reveal
['microsoft', 'push', 'cycle', 'windows', 'patch', 'temporarily', 'fix', 'critical', 'internet', 'explorer', 'flaw', 'reveal', 'early', 'week']
Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw <m> revealed </m> earlier this week .
http : / / www . mnn . com / green - tech / computers / stories / microsoft - to - release - patch - for - internet - explorer Microsoft to release patch for Internet Explorer 'The Fix' will remedy a vulnerability that allows an attacker to gain remote control of a Windows machine . . Wed , Sep 19 2012 at 11 : 47 AM Microsoft will push out an out - of - cycle Windows patch to temporarily fix the critical Internet Explorer flaw <m> revealed </m> earlier this week . "While we have only seen a few attempts to exploit the issue , impacting an extremely limited number of people , we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online , " Microsoft Trustworthy Computing director Yunsun Wee said in a blog posting on Sept . 18 . "The Fix it is an easy - to - use , one - click , full - strength solution any Internet Explorer user can install , " Wee wrote . "It will not affect your ability to browse the Web , and it will provide full protection against this issue until an update is available . It won ’ t require a reboot of your computer . "This Fix it will be available for everyone to download and install within the next few days , " she added . Microsoft usually pushes out software updates and security patches on the second Tuesday of every month . Out - of - cycle patches are reserved for the most serious flaws . It's not clear what exactly Microsoft has in mind , if , as Wee indicates , the "fix it" is not a real update . Microsoft initially suggested that all Internet Explorer users install and configure a utility called the Enhanced Mitigation Experience Toolkit ( EMET ) to prevent exploitation of the flaw , but admitted EMET might interfere with other applications . Most security experts , and the German government , have recommended a simpler solution : Stop using Internet Explorer entirely until the flaw is fully fixed . The Internet Explorer vulnerability allows an attacker to gain remote control of a Windows machine at the same level of privilege as the current user . That's not so bad if a given machine's current user has limited privileges , but very serious if the current user has administrator rights and can install , modify or delete software . The flaw affects all currently distributed and supported versions of Internet Explorer and Windows : Internet Explorer versions 6 , 7 , 8 , and 9 and Windows XP , Vista and 7 , as well as Windows Server 2003 , and 2008 . Windows 8 , due to be released to the general public Oct . 26 , and its accompanying Web browser , Internet Explorer 10 , are not affected . Nor is Windows Server 2012 .
27_2ecb.xml_11
train
ent
27_2ecb.xml
2
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
0
0
0
9
Microsoft
HUM16627702263331271
Microsoft
['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week']
<m> Microsoft </m> today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
Microsoft Patches IE , But Security Issues Remain As usual , the bad guys are ahead in the tug-of-war over security . <m> Microsoft </m> today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address . The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs . By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult . However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately . Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement . They have not been successful against systems where the patch has been applied , according to Budd . Microsoft is hosting two Webcasts to address customer questions about the security bulletin . The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada . The Webcast will be available on demand after that . According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth . One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened . This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 . Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site . Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com . They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code . An IFrame is an HTML element that lets users embed an HTML document inside another HTML document . The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 . `` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said . `` It 's a very Web 2.0 way of spreading malware . ''
27_2ecb.xml_17
train
ent
27_2ecb.xml
2
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
8
9
48
65
Internet Explorer
NON16628072497530110
Internet
['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week']
Microsoft today released a patch for the latest <m> Internet Explorer </m> ( IE ) browser vulnerability that has been in the news since last week .
Microsoft Patches IE , But Security Issues Remain As usual , the bad guys are ahead in the tug-of-war over security . Microsoft today released a patch for the latest <m> Internet Explorer </m> ( IE ) browser vulnerability that has been in the news since last week . However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address . The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs . By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult . However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately . Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement . They have not been successful against systems where the patch has been applied , according to Budd . Microsoft is hosting two Webcasts to address customer questions about the security bulletin . The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada . The Webcast will be available on demand after that . According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth . One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened . This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 . Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site . Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com . They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code . An IFrame is an HTML element that lets users embed an HTML document inside another HTML document . The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 . `` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said . `` It 's a very Web 2.0 way of spreading malware . ''
27_2ecb.xml_9
train
ent
27_2ecb.xml
2
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
4
4
27
32
patch
NON16727641175459595
patch
['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week']
Microsoft today released a <m> patch </m> for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
Microsoft Patches IE , But Security Issues Remain As usual , the bad guys are ahead in the tug-of-war over security . Microsoft today released a <m> patch </m> for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address . The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs . By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult . However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately . Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement . They have not been successful against systems where the patch has been applied , according to Budd . Microsoft is hosting two Webcasts to address customer questions about the security bulletin . The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada . The Webcast will be available on demand after that . According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth . One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened . This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 . Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site . Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com . They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code . An IFrame is an HTML element that lets users embed an HTML document inside another HTML document . The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 . `` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said . `` It 's a very Web 2.0 way of spreading malware . ''
27_2ecb.xml_14
train
ent
27_2ecb.xml
2
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
14
14
81
94
vulnerability
NON16727620231965862
vulnerability
['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week']
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser <m> vulnerability </m> that has been in the news since last week .
Microsoft Patches IE , But Security Issues Remain As usual , the bad guys are ahead in the tug-of-war over security . Microsoft today released a patch for the latest Internet Explorer ( IE ) browser <m> vulnerability </m> that has been in the news since last week . However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address . The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs . By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult . However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately . Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement . They have not been successful against systems where the patch has been applied , according to Budd . Microsoft is hosting two Webcasts to address customer questions about the security bulletin . The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada . The Webcast will be available on demand after that . According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth . One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened . This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 . Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site . Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com . They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code . An IFrame is an HTML element that lets users embed an HTML document inside another HTML document . The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 . `` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said . `` It 's a very Web 2.0 way of spreading malware . ''
27_2ecb.xml_15
train
ent
27_2ecb.xml
2
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
15
15
95
99
that
NON16727620231965862
that
['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week']
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability <m> that </m> has been in the news since last week .
Microsoft Patches IE , But Security Issues Remain As usual , the bad guys are ahead in the tug-of-war over security . Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability <m> that </m> has been in the news since last week . However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address . The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs . By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult . However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately . Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement . They have not been successful against systems where the patch has been applied , according to Budd . Microsoft is hosting two Webcasts to address customer questions about the security bulletin . The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada . The Webcast will be available on demand after that . According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth . One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened . This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 . Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site . Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com . They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code . An IFrame is an HTML element that lets users embed an HTML document inside another HTML document . The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 . `` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said . `` It 's a very Web 2.0 way of spreading malware . ''
27_2ecb.xml_13
train
ent
27_2ecb.xml
2
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
1
1
10
15
today
TIM27376179174463069
today
['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week']
Microsoft <m> today </m> released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
Microsoft Patches IE , But Security Issues Remain As usual , the bad guys are ahead in the tug-of-war over security . Microsoft <m> today </m> released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address . The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs . By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult . However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately . Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement . They have not been successful against systems where the patch has been applied , according to Budd . Microsoft is hosting two Webcasts to address customer questions about the security bulletin . The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada . The Webcast will be available on demand after that . According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth . One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened . This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 . Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site . Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com . They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code . An IFrame is an HTML element that lets users embed an HTML document inside another HTML document . The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 . `` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said . `` It 's a very Web 2.0 way of spreading malware . ''
27_2ecb.xml_16
train
ent
27_2ecb.xml
2
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
21
23
121
136
since last week
10000001986
since
['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week']
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news <m> since last week </m> .
Microsoft Patches IE , But Security Issues Remain As usual , the bad guys are ahead in the tug-of-war over security . Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news <m> since last week </m> . However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address . The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs . By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult . However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately . Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement . They have not been successful against systems where the patch has been applied , according to Budd . Microsoft is hosting two Webcasts to address customer questions about the security bulletin . The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada . The Webcast will be available on demand after that . According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth . One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened . This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 . Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site . Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com . They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code . An IFrame is an HTML element that lets users embed an HTML document inside another HTML document . The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 . `` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said . `` It 's a very Web 2.0 way of spreading malware . ''
27_2ecb.xml_10
train
evt
27_2ecb.xml
2
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
20
20
116
120
news
10000001987
news
['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week']
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the <m> news </m> since last week .
Microsoft Patches IE , But Security Issues Remain As usual , the bad guys are ahead in the tug-of-war over security . Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the <m> news </m> since last week . However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address . The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs . By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult . However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately . Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement . They have not been successful against systems where the patch has been applied , according to Budd . Microsoft is hosting two Webcasts to address customer questions about the security bulletin . The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada . The Webcast will be available on demand after that . According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth . One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened . This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 . Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site . Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com . They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code . An IFrame is an HTML element that lets users embed an HTML document inside another HTML document . The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 . `` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said . `` It 's a very Web 2.0 way of spreading malware . ''
27_2ecb.xml_12
train
evt
27_2ecb.xml
2
Microsoft today released a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
2
2
16
24
released
ACT16632487083891659
release
['microsoft', 'today', 'release', 'patch', 'late', 'internet', 'explorer', 'ie', 'browser', 'vulnerability', 'news', 'week']
Microsoft today <m> released </m> a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week .
Microsoft Patches IE , But Security Issues Remain As usual , the bad guys are ahead in the tug-of-war over security . Microsoft today <m> released </m> a patch for the latest Internet Explorer ( IE ) browser vulnerability that has been in the news since last week . However , malware authors have already begun pushing out customized variants of the flaw that the Microsoft patch may not address . The vulnerability , rooted in IE 's XML parser , lets attackers execute code on their victims ' PCs . By Saturday , at least 6,000 Web sites had been infected and the number is growing though ascertaining the exact number is difficult . However , security experts say things will get much worse , even if users follow Microsoft 's ( NASDAQ : MSFT ) advice to install the patch immediately . Currently attacks have only targeted IE 7 , Christopher Budd , security response communications lead at Microsoft , said in a statement . They have not been successful against systems where the patch has been applied , according to Budd . Microsoft is hosting two Webcasts to address customer questions about the security bulletin . The first was set for 1 p.m. PDT today and 11 a.m. PDT tomorrow in the U.S. and Canada . The Webcast will be available on demand after that . According to researcher Rahul Mohandas on the McAfee ( NYSE : MFE ) Avert Labs blog , malware authors have already begun issuing customized version of the IE exploit with various degrees of stealth . One of the most prominent techniques is where the attacker sends victims a Microsoft Word document by e-mail that contains an embedded ActiveX control triggered when the document is opened . This exploit was listed as one of the SysAdmin , Audit , Network , Security ( SANS ) Institute 's top 20 security risks in 2007 . Victims of the latest exploit are hit by drive-by injection attacks , where they go to a compromised Web site that automatically downloads malicious code onto their Web site . Malware authors have come up with a new twist on this , Dave Marcus , security research and communications director at McAfee Labs , told InternetNews.com . They plant an IFrame onto a legitimate site and the IFrame redirects unsuspecting visitors to the site hosting the malicious code . An IFrame is an HTML element that lets users embed an HTML document inside another HTML document . The CBS ( NYSE : CBS ) TV network site was hit by an IFrame attack on November 11 that saw visitors redirected to a server in Russia , according to security company Finjan 's MCRC blog on November 27 . `` We 've seen an awful lot of sites that have been compromised with the IFrame on them , '' Marcus said . `` It 's a very Web 2.0 way of spreading malware . ''
27_6ecbplus.xml_1
train
ent
27_6ecbplus.xml
1
Microsoft : IE Zero Day Flaw Affects All Versions
0
0
0
9
Microsoft
HUM16627702263331271
Microsoft
['microsoft', 'ie', 'zero', 'day', 'flaw', 'affect', 'version']
<m> Microsoft </m> : IE Zero Day Flaw Affects All Versions
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / <m> Microsoft </m> : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_2
train
ent
27_6ecbplus.xml
2
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
0
0
0
9
Microsoft
HUM16627702263331271
Microsoft
['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser']
<m> Microsoft </m> said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions <m> Microsoft </m> said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_3
train
ent
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
1
1
4
11
company
HUM16627702263331271
company
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The <m> company </m> said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The <m> company </m> said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_6
train
ent
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
3
3
17
19
it
HUM16627702263331271
it
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said <m> it </m> is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said <m> it </m> is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_7
train
ent
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
20
20
100
102
it
HUM16627702263331271
it
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is working on an official patch to plug the security hole , but in the meantime <m> it </m> has released a stopgap fix to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime <m> it </m> has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_9
train
ent
27_6ecbplus.xml
2
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
4
4
26
35
attackers
HUM16627963455277878
attacker
['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser']
Microsoft said today that <m> attackers </m> are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that <m> attackers </m> are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_10
train
ent
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
30
30
155
164
customers
HUM16627778540077611
customer
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected <m> customers </m> .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected <m> customers </m> . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_16
train
ent
27_6ecbplus.xml
2
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
19
20
131
148
Internet Explorer
NON16628072497530110
Internet
['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser']
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its <m> Internet Explorer </m> Web browser .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its <m> Internet Explorer </m> Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_23
train
ent
27_6ecbplus.xml
1
Microsoft : IE Zero Day Flaw Affects All Versions
8
8
41
49
Versions
NON16628062366463431
version
['microsoft', 'ie', 'zero', 'day', 'flaw', 'affect', 'version']
Microsoft : IE Zero Day Flaw Affects All <m> Versions </m>
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All <m> Versions </m> Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_57
train
ent
27_6ecbplus.xml
2
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
16
16
115
123
versions
NON16628062366463431
version
['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser']
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported <m> versions </m> of its Internet Explorer Web browser .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported <m> versions </m> of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_24
train
ent
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
9
9
46
51
patch
10000001988
patch
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is working on an official <m> patch </m> to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official <m> patch </m> to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_59
train
ent
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
14
14
73
77
hole
NON16628047448605797
hole
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is working on an official patch to plug the security <m> hole </m> , but in the meantime it has released a stopgap fix to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security <m> hole </m> , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_25
train
ent
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
25
25
126
129
fix
NON16628128321821328
fix
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap <m> fix </m> to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap <m> fix </m> to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_63
train
ent
27_6ecbplus.xml
1
Microsoft : IE Zero Day Flaw Affects All Versions
2
2
12
14
IE
NON16628072497530110
IE
['microsoft', 'ie', 'zero', 'day', 'flaw', 'affect', 'version']
Microsoft : <m> IE </m> Zero Day Flaw Affects All Versions
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : <m> IE </m> Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_66
train
ent
27_6ecbplus.xml
2
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
12
12
84
97
vulnerability
NON16628047448605797
vulnerability
['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser']
Microsoft said today that attackers are exploiting a previously unknown , unpatched <m> vulnerability </m> in all supported versions of its Internet Explorer Web browser .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched <m> vulnerability </m> in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_8
train
ent
27_6ecbplus.xml
2
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
2
2
15
20
today
10000001989
today
['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser']
Microsoft said <m> today </m> that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said <m> today </m> that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_69
train
ent
27_6ecbplus.xml
1
Microsoft : IE Zero Day Flaw Affects All Versions
3
5
15
28
Zero Day Flaw
NON16628047448605797
Zero
['microsoft', 'ie', 'zero', 'day', 'flaw', 'affect', 'version']
Microsoft : IE <m> Zero Day Flaw </m> Affects All Versions
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE <m> Zero Day Flaw </m> Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_34
train
evt
27_6ecbplus.xml
2
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
6
6
40
50
exploiting
ACT16628282010133294
exploit
['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser']
Microsoft said today that attackers are <m> exploiting </m> a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are <m> exploiting </m> a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_35
train
evt
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
5
6
23
33
working on
ACT16628434506216499
work
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is <m> working on </m> an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is <m> working on </m> an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_36
train
evt
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
11
11
55
59
plug
ACT16628469504676387
plug
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is working on an official patch to <m> plug </m> the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to <m> plug </m> the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_37
train
evt
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
22
22
107
115
released
ACT16628380851866429
release
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is working on an official patch to plug the security hole , but in the meantime it has <m> released </m> a stopgap fix to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has <m> released </m> a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_38
train
evt
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
28
28
138
145
protect
ACT16628446210704189
protect
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help <m> protect </m> affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help <m> protect </m> affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_29
train
evt
27_6ecbplus.xml
2
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
1
1
10
14
said
ACT16628911741694920
say
['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser']
Microsoft <m> said </m> today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft <m> said </m> today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_30
train
evt
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
2
2
12
16
said
10000001990
say
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company <m> said </m> it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company <m> said </m> it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_54
train
evt
27_6ecbplus.xml
2
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
11
11
74
83
unpatched
ACT16628577311223281
unpatched
['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser']
Microsoft said today that attackers are exploiting a previously unknown , <m> unpatched </m> vulnerability in all supported versions of its Internet Explorer Web browser .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , <m> unpatched </m> vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_55
train
evt
27_6ecbplus.xml
2
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
15
15
105
114
supported
10000001991
support
['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser']
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all <m> supported </m> versions of its Internet Explorer Web browser .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all <m> supported </m> versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_60
train
evt
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
24
24
118
125
stopgap
10000001992
stopgap
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a <m> stopgap </m> fix to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a <m> stopgap </m> fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_61
train
evt
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
13
13
64
72
security
10000001993
security
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is working on an official patch to plug the <m> security </m> hole , but in the meantime it has released a stopgap fix to help protect affected customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the <m> security </m> hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_39
train
evt
27_6ecbplus.xml
3
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers .
29
29
146
154
affected
10000001994
affected
['company', 'say', 'work', 'official', 'patch', 'plug', 'security', 'hole', 'meantime', 'release', 'stopgap', 'fix', 'help', 'protect', 'affected', 'customer']
The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect <m> affected </m> customers .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect <m> affected </m> customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_67
train
evt
27_6ecbplus.xml
2
Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
9
9
64
71
unknown
NEG16628966259122954
unknown
['microsoft', 'say', 'today', 'attacker', 'exploit', 'previously', 'unknown', 'unpatched', 'vulnerability', 'support', 'version', 'internet', 'explorer', 'web', 'browser']
Microsoft said today that attackers are exploiting a previously <m> unknown </m> , unpatched vulnerability in all supported versions of its Internet Explorer Web browser .
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw Affects All Versions Microsoft said today that attackers are exploiting a previously <m> unknown </m> , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_6ecbplus.xml_68
train
evt
27_6ecbplus.xml
1
Microsoft : IE Zero Day Flaw Affects All Versions
6
6
29
36
Affects
ACT28452315024913912
affect
['microsoft', 'ie', 'zero', 'day', 'flaw', 'affect', 'version']
Microsoft : IE Zero Day Flaw <m> Affects </m> All Versions
http : / / krebsonsecurity . com / 2013 / 09 / microsoft - ie - zero - day - flaw - affects - all - versions / Microsoft : IE Zero Day Flaw <m> Affects </m> All Versions Microsoft said today that attackers are exploiting a previously unknown , unpatched vulnerability in all supported versions of its Internet Explorer Web browser . The company said it is working on an official patch to plug the security hole , but in the meantime it has released a stopgap fix to help protect affected customers . Microsoft said it is aware of targeted attacks that attempt to exploit the vulnerability ( CVE - 2013 - 3893 ) in IE 8 and IE 9 versions of the default Windows browser . According to an advisory issued today , the flaw is a remote code bug , which means malware or miscreants could use it install malware just by coaxing IE users to browse a hacked or malicious Web site . The Fix It solution is available from this link . To apply it , click the Fix It icon above the Fix This Problem link . Applying this solution may limit some functionalities of IE , so if you run into problems after applying this interim patch , you can click the Fix It icon to the right of that “ enable ” button to reverse the update . Update : As several readers have already noted in the comments , this Fix It solution is for 32 - bit versions of IE only . In 64 - bit Windows , you can tell whether the browser you ’ re using is a 32 - bit or 64 - bit version by opening the Windows Task Manager ( Ctrl+Shift+Esc ) and clicking the Processes tab . The number that appears after the process name ( in this case , iexplore . exe ) indicates the version in use .
27_13ecb.xml_42
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
0
0
0
9
Microsoft
HUM16627702263331271
Microsoft
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
<m> Microsoft </m> today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers <m> Microsoft </m> today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_43
train
ent
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
4
4
18
27
Microsoft
HUM16627702263331271
Microsoft
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which <m> Microsoft </m> dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which <m> Microsoft </m> dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_44
train
ent
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
13
13
82
91
Microsoft
HUM16627702263331271
Microsoft
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that <m> Microsoft </m> says already has been used to attack more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that <m> Microsoft </m> says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_32
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
17
17
103
106
its
HUM16627702263331271
its
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security hole present in all versions of <m> its </m> Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of <m> its </m> Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_41
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
26
26
151
158
hackers
HUM16627963455277878
hacker
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that <m> hackers </m> have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that <m> hackers </m> have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_49
train
ent
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
26
26
157
162
users
HUM16627778540077611
user
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows <m> users </m> .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows <m> users </m> . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_50
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
37
37
219
224
users
HUM16627778540077611
user
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows <m> users </m> .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows <m> users </m> . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_30
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
20
20
125
128
Web
10000001995
web
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer <m> Web </m> browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer <m> Web </m> browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_35
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
24
24
141
145
flaw
NON16727620231965862
flaw
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a <m> flaw </m> that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a <m> flaw </m> that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_36
train
ent
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
11
11
63
76
vulnerability
NON16727620231965862
vulnerability
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft dubbed MS08-078 , fixes a security <m> vulnerability </m> that Microsoft says already has been used to attack more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security <m> vulnerability </m> that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_37
train
ent
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
12
12
77
81
that
NON16727620231965862
that
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability <m> that </m> Microsoft says already has been used to attack more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability <m> that </m> Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_38
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
32
32
189
193
data
10000001996
datum
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal <m> data </m> from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal <m> data </m> from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_39
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
15
15
91
99
versions
NON16728120065014833
version
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security hole present in all <m> versions </m> of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all <m> versions </m> of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_40
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
18
19
107
124
Internet Explorer
NON16628072497530110
Internet
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its <m> Internet Explorer </m> Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its <m> Internet Explorer </m> Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_51
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
5
5
36
42
update
NON16727641175459595
update
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency <m> update </m> to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency <m> update </m> to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_52
train
ent
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
1
1
4
9
patch
NON16727641175459595
patch
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The <m> patch </m> , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The <m> patch </m> , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_53
train
ent
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
6
6
35
43
MS08-078
NON16727641175459595
ms08-078
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft dubbed <m> MS08-078 </m> , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed <m> MS08-078 </m> , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_54
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
36
36
211
218
Windows
NON16759636276543635
Windows
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of <m> Windows </m> users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of <m> Windows </m> users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_55
train
ent
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
25
25
149
156
Windows
NON16759636276543635
Windows
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million <m> Windows </m> users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million <m> Windows </m> users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_34
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
11
11
71
75
hole
NON16727620231965862
hole
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security <m> hole </m> present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security <m> hole </m> present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_27
train
ent
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
1
1
10
15
today
TIM27376179174463069
today
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft <m> today </m> issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft <m> today </m> issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_45
train
evt
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
29
29
169
179
leveraging
ACT16759694191093666
leverage
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been <m> leveraging </m> to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been <m> leveraging </m> to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_46
train
evt
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
18
18
114
118
used
ACT16759694191093666
use
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been <m> used </m> to attack more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been <m> used </m> to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_48
train
evt
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
20
20
122
128
attack
ACT16759674029446388
attack
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to <m> attack </m> more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to <m> attack </m> more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_59
train
evt
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
5
5
28
34
dubbed
10000001997
dub
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft <m> dubbed </m> MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft <m> dubbed </m> MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_28
train
evt
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
7
7
46
50
plug
ACT16632539609441083
plug
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to <m> plug </m> a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to <m> plug </m> a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_29
train
evt
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
8
8
46
51
fixes
ACT16632539609441083
fix
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft dubbed MS08-078 , <m> fixes </m> a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , <m> fixes </m> a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_31
train
evt
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
31
31
183
188
steal
10000001998
steal
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to <m> steal </m> data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to <m> steal </m> data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_33
train
evt
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
2
2
16
22
issued
ACT16632487083891659
issue
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today <m> issued </m> an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today <m> issued </m> an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_47
train
evt
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
14
14
92
96
says
10000001999
say
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft <m> says </m> already has been used to attack more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft <m> says </m> already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_56
train
evt
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
10
10
62
70
security
10000002000
security
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an emergency update to plug a critical <m> security </m> hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical <m> security </m> hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_57
train
evt
27_13ecb.xml
1
Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
4
4
26
35
emergency
10000002001
emergency
['microsoft', 'today', 'issue', 'emergency', 'update', 'plug', 'critical', 'security', 'hole', 'present', 'version', 'internet', 'explorer', 'web', 'browser', 'flaw', 'hacker', 'leverage', 'steal', 'datum', 'million', 'windows', 'user']
Microsoft today issued an <m> emergency </m> update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an <m> emergency </m> update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_13ecb.xml_58
train
evt
27_13ecb.xml
2
The patch , which Microsoft dubbed MS08-078 , fixes a security vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
10
10
54
62
security
10000002002
security
['patch', 'microsoft', 'dub', 'ms08-078', 'fix', 'security', 'vulnerability', 'microsoft', 'say', 'attack', '2', 'million', 'windows', 'user']
The patch , which Microsoft dubbed MS08-078 , fixes a <m> security </m> vulnerability that Microsoft says already has been used to attack more than 2 million Windows users .
Microsoft Issues Emergency Patch to Curb Password-Stealing Hackers Microsoft today issued an emergency update to plug a critical security hole present in all versions of its Internet Explorer Web browser , a flaw that hackers have been leveraging to steal data from millions of Windows users . The patch , which Microsoft dubbed MS08-078 , fixes a <m> security </m> vulnerability that Microsoft says already has been used to attack more than 2 million Windows users . As Security Fix and other members of the tech community have chronicled , attackers have been busy compromising thousands of Web sites by seeding them with code that installs password-stealing software on computer systems of Web site visitors who use Internet Explorer . Microsoft estimated Monday that one in every 500 Windows users had been exposed to sites that try to exploit the flaw . Additionally , it said the number of victims was increasing at a rate of 50 percent daily . Vulnerability management company nCircle said Microsoft 's decision to issue the patch outside of its normal Patch Tuesday ( second Tuesday of each month ) cycle is wise , given the current exploitation of the flaw and because instructions for exploiting the flaw are now available online . `` Given the ongoing attacks for this bug and because the technical details have been available to the public for over a week , this is clearly a high risk client side vulnerability that everyone should patch now , '' said Andrew Storms , director of security for nCircle . This is an urgent update . If you use Windows , apply this patch now . Windows users can download the fix at Windows Update , or by enabling Automatic Updates .
27_8ecb.xml_28
train
ent
27_8ecb.xml
0
Microsoft issues emergency IE patch as attacks escalate
0
0
0
9
Microsoft
HUM16627702263331271
Microsoft
['microsoft', 'issue', 'emergency', 'ie', 'patch', 'attack', 'escalate']
<m> Microsoft </m> issues emergency IE patch as attacks escalate
<m> Microsoft </m> issues emergency IE patch as attacks escalate Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites . There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign . A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works . Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit . Once installed , the software steals login credentials for online games . Attack strings in separate SQL injections include 17gamo.com/1.js . Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here . `` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense . The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE . This is only the second time in 18 months that Microsoft has issued an unscheduled update . Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning . Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu . The patch can also be downloaded directly here . Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez .
27_8ecb.xml_29
train
ent
27_8ecb.xml
1
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
0
0
0
9
Microsoft
HUM16627702263331271
Microsoft
['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage']
<m> Microsoft </m> has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
Microsoft issues emergency IE patch as attacks escalate <m> Microsoft </m> has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites . There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign . A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works . Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit . Once installed , the software steals login credentials for online games . Attack strings in separate SQL injections include 17gamo.com/1.js . Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here . `` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense . The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE . This is only the second time in 18 months that Microsoft has issued an unscheduled update . Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning . Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu . The patch can also be downloaded directly here . Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez .
27_8ecb.xml_27
train
ent
27_8ecb.xml
1
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
13
13
82
92
miscreants
HUM16627963455277878
miscreant
['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage']
Microsoft has issued a rare emergency update for its Internet Explorer browser as <m> miscreants </m> stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
Microsoft issues emergency IE patch as attacks escalate Microsoft has issued a rare emergency update for its Internet Explorer browser as <m> miscreants </m> stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites . There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign . A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works . Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit . Once installed , the software steals login credentials for online games . Attack strings in separate SQL injections include 17gamo.com/1.js . Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here . `` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense . The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE . This is only the second time in 18 months that Microsoft has issued an unscheduled update . Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning . Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu . The patch can also be downloaded directly here . Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez .
27_8ecb.xml_22
train
ent
27_8ecb.xml
1
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
25
25
166
174
webpages
10000002003
webpage
['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage']
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of <m> webpages </m> .
Microsoft issues emergency IE patch as attacks escalate Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of <m> webpages </m> . In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites . There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign . A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works . Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit . Once installed , the software steals login credentials for online games . Attack strings in separate SQL injections include 17gamo.com/1.js . Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here . `` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense . The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE . This is only the second time in 18 months that Microsoft has issued an unscheduled update . Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning . Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu . The patch can also be downloaded directly here . Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez .
27_8ecb.xml_32
train
ent
27_8ecb.xml
1
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
9
10
53
70
Internet Explorer
NON16628072497530110
Internet
['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage']
Microsoft has issued a rare emergency update for its <m> Internet Explorer </m> browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
Microsoft issues emergency IE patch as attacks escalate Microsoft has issued a rare emergency update for its <m> Internet Explorer </m> browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites . There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign . A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works . Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit . Once installed , the software steals login credentials for online games . Attack strings in separate SQL injections include 17gamo.com/1.js . Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here . `` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense . The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE . This is only the second time in 18 months that Microsoft has issued an unscheduled update . Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning . Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu . The patch can also be downloaded directly here . Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez .
27_8ecb.xml_36
train
ent
27_8ecb.xml
0
Microsoft issues emergency IE patch as attacks escalate
3
3
27
29
IE
NON16628072497530110
IE
['microsoft', 'issue', 'emergency', 'ie', 'patch', 'attack', 'escalate']
Microsoft issues emergency <m> IE </m> patch as attacks escalate
Microsoft issues emergency <m> IE </m> patch as attacks escalate Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites . There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign . A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works . Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit . Once installed , the software steals login credentials for online games . Attack strings in separate SQL injections include 17gamo.com/1.js . Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here . `` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense . The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE . This is only the second time in 18 months that Microsoft has issued an unscheduled update . Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning . Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu . The patch can also be downloaded directly here . Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez .
27_8ecb.xml_19
train
ent
27_8ecb.xml
1
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
19
19
124
137
vulnerability
NON16727620231965862
vulnerability
['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage']
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a <m> vulnerability </m> on hundreds of thousands of webpages .
Microsoft issues emergency IE patch as attacks escalate Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a <m> vulnerability </m> on hundreds of thousands of webpages . In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites . There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign . A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works . Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit . Once installed , the software steals login credentials for online games . Attack strings in separate SQL injections include 17gamo.com/1.js . Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here . `` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense . The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE . This is only the second time in 18 months that Microsoft has issued an unscheduled update . Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning . Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu . The patch can also be downloaded directly here . Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez .
27_8ecb.xml_20
train
ent
27_8ecb.xml
0
Microsoft issues emergency IE patch as attacks escalate
4
4
30
35
patch
NON16727641175459595
patch
['microsoft', 'issue', 'emergency', 'ie', 'patch', 'attack', 'escalate']
Microsoft issues emergency IE <m> patch </m> as attacks escalate
Microsoft issues emergency IE <m> patch </m> as attacks escalate Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites . There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign . A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works . Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit . Once installed , the software steals login credentials for online games . Attack strings in separate SQL injections include 17gamo.com/1.js . Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here . `` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense . The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE . This is only the second time in 18 months that Microsoft has issued an unscheduled update . Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning . Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu . The patch can also be downloaded directly here . Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez .
27_8ecb.xml_21
train
ent
27_8ecb.xml
1
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
6
6
38
44
update
NON16727641175459595
update
['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage']
Microsoft has issued a rare emergency <m> update </m> for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
Microsoft issues emergency IE patch as attacks escalate Microsoft has issued a rare emergency <m> update </m> for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites . There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign . A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works . Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit . Once installed , the software steals login credentials for online games . Attack strings in separate SQL injections include 17gamo.com/1.js . Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here . `` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense . The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE . This is only the second time in 18 months that Microsoft has issued an unscheduled update . Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning . Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu . The patch can also be downloaded directly here . Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez .
27_8ecb.xml_30
train
evt
27_8ecb.xml
0
Microsoft issues emergency IE patch as attacks escalate
6
6
39
46
attacks
ACT16759674029446388
attack
['microsoft', 'issue', 'emergency', 'ie', 'patch', 'attack', 'escalate']
Microsoft issues emergency IE patch as <m> attacks </m> escalate
Microsoft issues emergency IE patch as <m> attacks </m> escalate Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages . In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites . There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign . A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works . Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit . Once installed , the software steals login credentials for online games . Attack strings in separate SQL injections include 17gamo.com/1.js . Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here . `` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense . The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE . This is only the second time in 18 months that Microsoft has issued an unscheduled update . Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning . Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu . The patch can also be downloaded directly here . Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez .
27_8ecb.xml_31
train
evt
27_8ecb.xml
1
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up attacks targeting a vulnerability on hundreds of thousands of webpages .
16
16
104
111
attacks
ACT16759674029446388
attack
['microsoft', 'issue', 'rare', 'emergency', 'update', 'internet', 'explorer', 'browser', 'miscreant', 'step', 'attack', 'target', 'vulnerability', 'hundred', 'thousand', 'webpage']
Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up <m> attacks </m> targeting a vulnerability on hundreds of thousands of webpages .
Microsoft issues emergency IE patch as attacks escalate Microsoft has issued a rare emergency update for its Internet Explorer browser as miscreants stepped up <m> attacks </m> targeting a vulnerability on hundreds of thousands of webpages . In many cases , the websites distributing the toxic payload are legitimate destinations that have been commandeered , allowing an attacker to snare victims as they surf to online banks , forums , and other trusted sites . There are at least six distinct versions of attack code circulating in the wild , according to researchers at iDefense , a security lab owned by VeriSign . A web search showed 233,000 pages containing the string ardoshanghai.com/s.js , just one of many web addresses exploiting a weakness in the way IE 's data-binding function works . Most of the attacks silently install keylogging software as soon as a victim surfs to a site carrying the exploit . Once installed , the software steals login credentials for online games . Attack strings in separate SQL injections include 17gamo.com/1.js . Researchers say the number of attack sites is too high to keep exhaustive lists , but Shadowserver is doing an admirable job here . `` The vulnerability is so juicy that we expect it to show up in tool kits fairly shortly , '' said Rick Howard , intelligence director of iDefense . The patch was released eight days after reports began circulating that websites were targeting a vulnerability in fully patched versions of IE . This is only the second time in 18 months that Microsoft has issued an unscheduled update . Typically , patches are available on the second Tuesday of each month to allow system administrators time for planning . Given the prevalence of attacks , there 's no good reason why anyone running a Windows machine should n't stop what they 're doing and install the patch immediately ( those with administrative rights , anyway ) - doing so is as easy as opening IE and selecting Windows Update from the Tools menu . The patch can also be downloaded directly here . Howard mentioned the site of `` a major financial institution '' that he found hosting the exploit , so do n't think you 're immune just because you steer clear of porn and warez .