{"id":4711,"date":"2014-05-02T10:00:50","date_gmt":"2014-05-02T14:00:50","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=4711"},"modified":"2020-02-27T03:42:26","modified_gmt":"2020-02-26T16:42:26","slug":"a-week-in-the-news-ie-zero-days","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/a-week-in-the-news-ie-zero-days\/4711\/","title":{"rendered":"A Week in the News: IE Zero Days"},"content":{"rendered":"<p>The OpenSSL Heartbleed bug may have finally fallen out of the Headlines this week. In fact, thinking about it as I write this very article, it\u2019s nearly 3 PM, and I haven\u2019t read a Heartbleed article all day, which is wonderful. Don\u2019t worry, though, even without the Heartbleed, we\u2019ve got plenty to talk about:<\/p>\n<p><b>Zero-Days<\/b><\/p>\n<p><a href=\"https:\/\/www.securelist.com\/en\/blog\/8212\/New_Flash_Player_0_day_CVE_2014_0515_used_in_watering_hole_attacks\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Lab announced that it uncovered an Adobe Flash Player zero-day<\/a> earlier this week. The company uncovered the bug \u2013 oddly enough \u2013 using one of the very same tools it uses to uncover new malware samples. When it was discovered, the zero-day exploit was being used to target victims in Syria with a type of threat called a watering hole attack. A watering hole is a type of targeted attack where an attacker plants a piece of malware on a website he thinks his victim is likely to visit. This way, when and if that victim visits the infected website, the victim then becomes infected with malware. Adobe has since provided a patch for the bugs here, so you should install any updates from that company as soon as possible.<\/p>\n<p><a href=\"https:\/\/threatpost.com\/new-internet-explorer-cve-2014-1776-zero-day-used-in-targeted-attacks\/105720\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft had its own zero-day problems<\/a> in its Internet Explorer browser. I won\u2019t go into the technical details of the vulnerability. However, I will tell you that the zero-day has been exploited in the wild to launch attacks against various targets and that it was apparently serious enough to warrant what Microsoft calls an \u201cOut of Band\u201d patch. Such patches are those that are shipped out on any day other than the company\u2019s well-established monthly Patch Tuesday releases. If a bug receives an out-of-band patch, this is usually a pretty good indicator that the bug in question was a serious one.<\/p>\n<div class=\"pullquote\">Microsoft Internet Explorer and Adobe Flash Player zero-days replace OpenSSL Heartbleed as the primary topic of discussion in this week\u2019s security news.<\/div>\n<p><b>Just When I Thought I Was Out, They Pull Me Back In<\/b><\/p>\n<p>Speaking of Patch Tuesday: remember earlier this month when we told you that <a href=\"https:\/\/www.kaspersky.com.au\/blog\/xp-is-there-life-after-the-end-of-support\/\" target=\"_blank\" rel=\"noopener\">Windows XP would no longer receive security updates<\/a>? We were wrong (at least technically speaking). Because the Internet Explorer zero-day referenced above is being used to actively target Windows XP machines, Microsoft found it in their heart to send <a href=\"https:\/\/threatpost.com\/windows-xp-systems-also-get-out-of-band-ie-zero-day-patch\/105838\" target=\"_blank\" rel=\"noopener nofollow\">the out-of-band Internet Explorer patch to XP users as well<\/a>.<\/p>\n<p><b>AOL is Back!<\/b><\/p>\n<p>A number of AOL email users found themselves in a pickle recently after their accounts appeared to be used to send out spam messages to the people on their contact lists. We discussed this in <a href=\"https:\/\/www.kaspersky.com.au\/blog\/heartbleed-lingers-as-apple-fixes-its-own-crypto\/\" target=\"_blank\" rel=\"noopener\">last week\u2019s news recap<\/a>. AOL claimed that the incident was all part of what they called a \u201cspoofing\u201d attack. They said there was no compromise and that it only appeared as if the emails were coming from AOL user email accounts. In reality, the company initially claimed, the sender of the emails was merely making it appear as if the emails were coming from AOL user email accounts.<\/p>\n<p>If I call recall correctly, last week we said that AOL\u2019s explanation of events was odd in that \u2013 while there may have indeed been spoofing going on \u2013 it failed to account for how the attacker would have gotten his hands on all those contact lists. Sure enough, <a href=\"https:\/\/threatpost.com\/aol-investigating-breach-urges-users-to-change-passwords\/105734\" target=\"_blank\" rel=\"noopener nofollow\">AOL admitted<\/a> this week that it was in fact breached in an announcement urging users to change their passwords. So, if you have an AOL account, this is probably a good time to change up your password.<\/p>\n<p><b>Facebook and Privacy<\/b><\/p>\n<p>Facebook announced a neat new feature called <a href=\"https:\/\/threatpost.com\/facebook-enhances-privacy-settings-with-anonymous-login\/105831\" target=\"_blank\" rel=\"noopener nofollow\">Anonymous Login<\/a>. Mark Zuckerberg told developers at the company\u2019s F8 conference yesterday that Anonymous Login would allow users to log in to third-party apps without using their Facebook credentials, and without sharing personal information with the third party.<\/p>\n<p>\u201cThe idea here is that even if you don\u2019t want an app to know who you are yet, you still want a streamlined experience for signing in that removes the hassle of filling out all these different fields,\u201d Zuckerberg said. \u201cThis is going to let you try apps without fear.\u201d<\/p>\n<p>Anonymous Login is in beta and available only for certain applications; Flipboard, for example, is one of the first. At login, users will have the option of signing in to an app with their Facebook credentials or test-driving the app using Anonymous Login. Anonymous Login presents itself in a black screen, rather than Facebook\u2019s customary blue, and affords users the ability to avoid sharing any of the data already shared with Facebook with an outside app.<\/p>\n<p><b>The New Mozilla<\/b><\/p>\n<p>The 29th version of Mozilla\u2019s Firefox browser hit the scene this week with a radical redesign. The new Firefox, which look surprisingly Google Chrome-like, is receiving mixed reviews. Regardless of whether you like the new look, though, we are recommending that you install <a href=\"https:\/\/threatpost.com\/mozilla-redesigns-firefox-browser-fixes-security-vulnerabilities\/105790\" target=\"_blank\" rel=\"noopener nofollow\">the update<\/a> anyway on account of the 10-or-so highly- and critically-rated security vulnerabilities that were fixed in the new version.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Internet Explorer and Adobe Flash Player zero-days replace OpenSSL Heartbleed as the primary topic of discussion in this week\u2019s security news.<\/p>\n","protected":false},"author":42,"featured_media":4712,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[21,634,38,574,637,121,635,636],"class_list":{"0":"post-4711","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-firefox","9":"tag-ie","10":"tag-microsoft","11":"tag-news-2","12":"tag-recap","13":"tag-updates","14":"tag-xp","15":"tag-zero-days"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/a-week-in-the-news-ie-zero-days\/4711\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/a-week-in-the-news-ie-zero-days\/3416\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/a-week-in-the-news-ie-zero-days\/3303\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/a-week-in-the-news-ie-zero-days\/3725\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/a-week-in-the-news-ie-zero-days\/3824\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/a-week-in-the-news-ie-zero-days\/4711\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/a-week-in-the-news-ie-zero-days\/3567\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/a-week-in-the-news-ie-zero-days\/4711\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/firefox\/","name":"Firefox"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=4711"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4711\/revisions"}],"predecessor-version":[{"id":26312,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4711\/revisions\/26312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/4712"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=4711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=4711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=4711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}