Posted on 06/26/2015 7:36:19 PM PDT by Utilizer
HP researchers have published details and proof-of-concept exploit code for a number of zero-day vulnerabilities in Microsoft's Internet Explorer web browser which allow attackers to bypass a key exploit mitigation.
The researchers - part of HP's zero-day initiative team - have a policy to only disclose details of bugs reported to vendors after patches are issued.
But the team decided to go public after being informed by Microsoft that it did not intend to fix the bugs as the company feels the vulnerabilities don't affect enough users.
The flaws were serious enough, however, for Microsoft to earlier award the HP team a US$125,000 bug bounty.
(Excerpt) Read more at itnews.com.au ...
Apology accepted, no problem, we all make mistakes.
Ping lists are maintained by volunteer individual FReepers. Every few years somebody tries to compile a list of the ping lists and who is running each one, but it’s difficult to track, as there’s no central registry of anything.
So you actually have as much “access to ping lists” as any of us, which is to say, best of luck! If you see s comment that appears to be to a long list of people, and certainly if it has a banner or label identifying it as a ping list, just contact the person who posted it and ask them about it.
Gotta run now, have a great evening and weekend!
Please enlighten me on when the most popular email client for worldwide corporate interests was “hacked into?” Outlook Express I might give you, but Outlook is the most used email client in the world. I’ve been a Microsoft engineer for over 15 years and don’t recall Outlook ever being implicated in a “hack.” It’s a mail client. Not much to hack.
Microsoft has made it very clear that they'll no longer be programming to 32-bit operating system environments. Server 2012 is not available in 32-bit flavors, and future version of the desktop operating system will not be available in 32-bit.
32-bit is literally so 10 years ago. There are no modern hardware platforms produced anywhere in the world that are solely 32-bit.
Someone please remind me what Internet Explorer is again.
It’s the browser you use to download another browser
And it’s + one for the win.
I have had many clients over the years have their email accounts hacked into and sometimes hijacked. The most common denominator was usually Outlook Express, with Outlook a distant second. It became so bad that somewhere around 1999 I began actively recommending they remove the programs from their computers and use a professional service such as Fastmail instead.
Outlook, Outlook Express, and HotMail were not program-hacked, but their password data was compromised so badly that many people had their logins copied and lists of their login names and passwords were commonly available on the internet. You could go to various sources especially on Usenet and get such lists to log onto various sites or establish a presence or account on other websites.
Just FYI.
Your story is illustrative of the need to regularly rotate your common passwords. I know people who’ve used the same password for decades. It takes one breach, and the bad guys know how to access your entire life.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.