{"id":358,"date":"2014-05-06T19:46:00","date_gmt":"2014-05-06T19:46:00","guid":{"rendered":"https:\/\/ntegrait.com\/urgent-ie-threat-leads-microsoft-to-issue-zero-day-patch-rescue-windows-xp-users-but-dont-expect-to-be-saved-next-time.html"},"modified":"2014-05-06T19:46:00","modified_gmt":"2014-05-06T19:46:00","slug":"urgent-ie-threat-leads-microsoft-to-issue-zero-day-patch-rescue-windows-xp-users-but-dont-expect-to-be-saved-next-time","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/urgent-ie-threat-leads-microsoft-to-issue-zero-day-patch-rescue-windows-xp-users-but-dont-expect-to-be-saved-next-time\/","title":{"rendered":"Urgent IE Threat Leads Microsoft to Issue Zero-Day Patch & Rescue Windows XP Users \u2013 But Don\u2019t Expect to be Saved Next Time!"},"content":{"rendered":"

\"WindowsStill running Windows XP? If so, you\u2019re about to face the first major IE threat since Microsoft ended support on April 8th<\/sup>, 2014. And not to worry you, but the threat is extremely severe for Windows XP users. When a hacker exploits the threat, they\u2019re able to gain control of your PC and gain the same user rights as you. Essentially, this allows the hacker to steal all of your business data.<\/p>\n

Do Not Ignore This Threat \u2013 The Consequences of Data Theft Can Ruin Your Business! <\/strong><\/p>\n

FireEye Research Labs discovered the zero-day exploit, which impacts IE 6 through IE 11; however, the attack specifically targets IE 9 through IE 11. While Microsoft has ended support for Windows XP, an out-of-band patch for IE users and an update for XP users have been released due to the severity of the threat.<\/p>\n

But what\u2019s so severe about the zero-day exploit? Well, the threat allows attackers to host malicious websites designed to exploit the vulnerability in affected versions of Internet Explorer. Once the hacker has created a malicious website, it\u2019s simple to convince unsuspecting users to click a link and visit the site.<\/p>\n

If you do visit the site, the hacker can gain control of your PC and gain the same user rights as you. Once this happens, the hacker is able to steal all of your business data and the following confidential information could end up in the wrong hands:<\/p>\n