“Cookiejacking” Discovered in Internet Explorer

by Enstep Team | Jul 11, 2011 | Articles

While Microsoft’s Internet Explorer continues to enjoy a wide audience – businesses included a new flaw has been discovered in the browser. Called “cookiejacking”, the flaw allows hackers to access passwords and other personal information stored in any cookie from any website.

Despite a few flaws, Internet Explorer remains one of the most commonly used browsers in businesses today, making it a ripe target for hackers looking for security flaws to exploit.

One such flaw has been discovered recently by a security researcher in Italy. Dubbed “cookiejacking”, the flaw allows hackers to hijack a cookie of any website, thereby allowing them to gain access to passwords, credit card information, and various other data stored in the cookie. The flaw is found in any version of Internet Explorer in any version of Windows.

However, users must first drag and drop an item before the exploit can be activated. It might sound like a bit of a stretch, but hackers are known for their creativity, so expect that a seemingly appropriate situation will be presented in which you will find it perfectly normal to do a drag-and-drop action.

Microsoft responded to the threat by labeling it as “low risk”, citing the level of user interaction required for cookiejacking to occur. It did, however, encourage users to be more vigilant and alert, as well as to refrain from clicking suspicious links and visiting dubious websites.

Regardless of what platform or OS you use, there is always the constant threat from cyberattacks all it takes is one attack to break through and put important business data at risk. It is essential to always educate users on how to avoid being victimized by scams and hacks, and to have the right security software to ensure that your company’s information is safe and secure.

If you are interested in user training for security and / or better security protocols, please give us a call and we’ll be happy to draw up a custom security blueprint that’s tailor-made to meet your needs.

Published with permission from TechAdvisory.org. Source.

Related Posts

5 Easy Ways to Ensure Customer Satisfaction

5 Easy Ways to Ensure Customer Satisfaction

When it comes to running a business, popular wisdom says that “the customer is always right.” While this may not hold true in every case, the idea behind it endures.  The customer may not always right, but their satisfaction is necessary for your success.  When...

7 Things to Look for in a Virtual Assistant

7 Things to Look for in a Virtual Assistant

Your busy schedule may have you thinking about hiring an assistant. A virtual assistant is a cost-effective and efficient option to consider. Since you don’t have to provide office space, it’s cheaper than hiring someone on-site. Use this guide as you search for the...

Technology Trends: What to Expect in 2017

Technology Trends: What to Expect in 2017

A new year always brings new predictions for what will be trending and what we can all look forward to in the news, politics, entertainment, and more. In the world of technology, innovations and advancements are a fast, steady stream as developers make everything...

FIND OUT WHAT YOUR BUSINESS SHOULD EXPECT TO PAY
FOR HOUSTON TECH SUPPORT

Give us a call and discover how great local IT services and computer support can be!