Older Versions of the Yahoo! Toolbar may cause Internet Explorer to stop responding or unexpectedly close

December 24, 2010 by  
Filed under Security News


The third-party products that this article discusses are manufactured by companies that are independent of Microsoft.


Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products.



  • Internet Explorer has stopped working
  • Internet Explorer encountered a problem and needs to close



As a result of some changes made by Yahoo! older versions of the Yahoo! toolbar can cause Internet Explorer to stop responding or unexpectedly close.



To resolve this issue, Yahoo! and Microsoft recommend that you uninstall and reinstall the toolbar as follows:


Please have a pen and paper handy to write down the following information for your version of Windows and then perform those steps to resolve the issue on your computer:


For Windows XP

  1. Click Start, and then click Control Panel.
  2. Double-click  Add or Remove Programs.
  3. Scroll to and click Yahoo! Toolbar to select it, and then click Remove.
  4. Follow any confirmation prompts.
  5. Close Add or Remove Programs and then restart Internet Explorer to verify that the issue is resolved.
  6. To re-install the Yahoo! Toolbar to the latest version, please visit http://us.toolbar.yahoo.com/ and follow the steps on the website.


    For Windows 7 and Windows Vista

    1. Click Start, and then click Control Panel.
    2. Under Programs, click Uninstall a program.
    3. Scroll to and click Yahoo! Toolbar to select it, and then click Uninstall from the options above.
    4. Click Yes on the uninstall warning pop-up window.
    5. Close Uninstall a program and then restart Internet Explorer to verify that the issue is resolved.
    6. To re-install the Yahoo! Toolbar to the latest version, please visit http://us.toolbar.yahoo.com/ and follow the steps on the website.




    A swarm of Safari security holes: Mac and Windows users told to update

    June 9, 2010 by  
    Filed under Security News

    Whether you own a Windows or Mac OS X computer, if you’re a user of Apple’s Safari browser, it’s time to update your computer against a swarm of security vulnerabilities.


    With the attention of most Apple devotees diverted this week towards the sleek new iPhone 4, some may have missed that the Cupertino-based company has also issued a brand new version of its web browser, Safari.


    Most interestingly to us, however, is the news that Safari 5.0 not only includes new functionality, but also plugs at least 48 different security vulnerabilities that (if left unpatched) could be exploited by hackers.


    Mac OS X version 10.4 users (which Safari 5 doesn’t support) aren’t left in the lurch either. Apple has issued Safari version 4.1 for those customers, which addresses the same set of security issues.


    Read More…


    Microsoft to release emergency Internet Explorer patch on Tuesday

    March 29, 2010 by  
    Filed under Security News

    Microsoft has announced that it will be issuing an emergency out-of-band patch for a critical security hole in some versions of Internet Explorer on Tuesday 30 March.


    According to a Microsoft advisory, the emergency fix is designed to protect users of Internet Explorer 6 and Internet Explorer 7.


    Microsoft normally bundles its security updates into a monthly package, known in the industry as “Patch Tuesday” (the second Tuesday of each month), and it is relatively unusual for the company to issue a fix for a security vulnerability outside of this cycle. Clearly Microsoft considers the bug particularly important to patch as soon as possible.


    And in my opinion they’re right not to leave this vulnerability unpatched until April 13th. Earlier this month I described how hackers are actively exploiting the vulnerability, in their attempt to infect computers.


    The researchers in SophosLabs reported some of the malicious spam messages we have seen being distributed which attempt to trick users into visiting websites that will exploit the zero day vulnerability and infect Windows PCs.


    More information about the security flaw can be found in Sophos’s analysis of the problem.


    So, if you are still using Internet Explorer versions 6 or 7, please be sure to update your systems as soon as Microsoft releases the fix. But, in all honesty, what are you doing running such old versions of IE anyway? Shouldn’t you have upgraded to Internet Explorer 8 by now?


    By Graham Cluley, Sophos



    Related Blogs

      Protecting against the Internet Explorer zero day vulnerability

      March 16, 2010 by  
      Filed under Security News

      A few days ago Microsoft warned its users of an unpatched security hole in its products that could leave Windows users exposed to attacks by cybercriminals.


      The Internet Explorer vulnerability, which has the CVE reference CVE-2010-0806 and fortunately does not affect Internet Explorer 8, is being actively exploited by malicious hackers. As reported on the SophosLabs blog, we have seen malicious spam messages being distributed which try and trick users into visiting websites that will exploit the zero day vulnerability to infect PCs.


      Sophos detects the exploit scripts seen so far generically as Troj/ExpJS-R.


      A proper patch from Microsoft for the problem is not yet available, but the company has issued a couple of workarounds that can be used by vulnerable Windows users.


      One of Microsoft’s workarounds makes it easy for users to automate the changes that need to be made to the Windows registry (something that normally can give regular users the heebie-jeebies) to disable the “peer factory” class on Windows XP and Windows Server 2003.


      They have also provided a workaround that enables Data Execution Prevention (DEP) on Internet Explorer 6 Service Pack 2 and Internet Explorer 7.


      If you are responsible for the security of a number of Windows PC, rather than just your personal computer, you may wish to read the more detailed advice Microsoft provides on workarounds.


      More information about the security flaw can be found in Sophos’s analysis of the problem.


      There’s no word yet on when Microsoft will make available a proper fix for this problem, or indeed whether it will be included in their next scheduled “Patch Tuesday” bundle of patches scheduled for April 13th or released as an out-of-bound fix.


      But I think it’s good that they gave the less geeky users of computers a fairly easy way to implement the workaround, rather than leaving them befuddled by complicated instructions.


      This latest attack is a timely reminder for all Internet Explorer users that maybe it’s high time they updated their systems to version 8.0 of the popular web browser.


      By Graham Cluley, Sophos



      (McAfee) Operation Aurora Overview (Video)

      January 19, 2010 by  
      Filed under Security Channel


      Find out what operation aurora is, what’s at risk, and how to protect your organization.


      German Government: Don’t use Internet Explorer

      January 18, 2010 by  
      Filed under Security News

      The German government has advised computer users not to run Internet Explorer and run an alternative browser instead, because of a critical zero-day security flaw.


      The advice, which came in the form of an official statement from the German Federal Office for Security in Information Technology (known as the Bundesamt für Sicherheit in der Informationstechnik or BSI) says that the as yet unpatched vulnerability is likely to be the same one blamed for hacker attacks on Google and other US companies last week.


      The BSI advisory claims that although Microsoft’s advice to run Internet Explorer in ‘protected mode’ and disable Active Scripting makes it more difficult for hackers to attack, it does not completely prevent them.

      German government Internet Explorer advisory

      Here is a rough translation (courtesy of Google Translate) of the BSI statement:

      Critical vulnerability in Internet Explorer

      BSI recommends the temporary use of an alternative browser
      Bonn, 15.01.2010.

      In Internet Explorer there exists a critical yet unknown vulnerability. The vulnerability allows attackers to inject malicious code via a specially crafted webpage into a Windows computer, in order to infiltrate and control computers. The past week has become known in the Hacker Attack on Google and other U.S. companies has probably exploited the vulnerability.

      Affected are the versions 6, 7, and 8 of Internet Explorer on Windows XP, Vista and Windows 7. Microsoft has published a security advisory, in which it discusses ways of minimizing risk and is already working on a patch for the security hole. The BSI expects that this vulnerability will be used in a short time for attacks on the Internet.

      Although running Internet Explorer in "protected mode" as well as disabling Acitve Scripting does make it more difficult to attack, it can not completely prevented. Therefore, the BSI recommends that users switch to an alternative browser while waiting for Microsoft's patch.

      Once the vulnerability has been closed, the BSI on its warning and information service MayorCERT also informed. Keep informed about the civic-CERT and the BSI warns citizens and small and medium enterprises from viruses, worms and vulnerabilities in computer applications. The expert analysis of the BSI around the clock, the security situation in the Internet and send alerts when action is needed and safety information via E-mail.


      The vulnerability means that a hacker could send you a message, perhaps pretending to be from a colleague or friend, and – if you clicked on a link in that email – your vulnerable installation of Internet Explorer would visit a malicious webpage infecting your Windows PC with a Trojan horse.


      At that point the hackers could effectively grab control of your computer, with the potential of stealing company secrets, personal information or using it to spread spam or other attacks. The problem is that right now Microsoft doesn’t have a patch to fix their software.


      Of course, the German government’s advice that internet users should switch to alternative browsers is unlikely to well received at Microsoft, and pressure is sure to grow on the company to release an “out-of-band” patch to resolve the security flaw as soon as possible.


      With Google pointing the finger of blame for the attacks at China, it’s perhaps not surprising that the German government should be keen to ensure that its own computers (whether they be in government or industry) are not next in the firing line of hackers.


      Alternative internet browsers such as Firefox, Safari and Opera have all suffered from security vulnerabilities in the past, of course.


      You can read SophosLabs’s write-up on the Microsoft security flaw here, as well as further commentary by principal virus researcher Vanja Svajcer.


      With all this talk about state-sponsored cyber-spying originating from China clearly spooking the German authorities, it’s perhaps a little ironic that the Germans themselves were accused of using the internet and malware to spy on another country a couple of years ago.


      by Graham Cluley, Sophos


      Microsoft Warns of IE Exploit Code in The Wild

      November 24, 2009 by  
      Filed under Security News


      Microsoft on Monday said it is investigating a possible vulnerability in Internet Explorer after exploit code that allegedly can be used to take control of computers, if they visit a Web site hosting the code, was posted to a security mailing list.

      Read more

      TrendProtect™ Version 1.2 FREE browser plug-in (IE Only)

      August 21, 2009 by  
      Filed under Protection Tools

      TrendProtect is a FREE browser plug-in that helps you avoid Web pages with unwanted content and hidden threats. TrendProtect rates the current page and pages listed in Google, MSN, and Yahoo search results. You can use the rating to decide if you want to visit or avoid a given Web page. To rate Web pages, TrendProtect refers to an extensive database that covers the following information for billions of Web pages:


      Read more

      More Zero-Day Exploits for Firefox and IE Flaws

      July 22, 2009 by  
      Filed under Security News


      Senior Threat Researcher Joseph Reyes spotted several malicious script files that exploited Mozilla Firefox and Microsoft Internet Explorer vulnerabilities:

      • JS_DIREKTSHO.B exploits a vulnerability in Microsoft Video Streaming ActiveX control to download other possibly malicious files.
      • JS_FOXFIR.A accesses a website to download JS_SHELLCODE.BV. In turn JS_SHELLCODE.BV exploits a vulnerability in Firefox 3.5 to download WORM_KILLAV.AKN.
      • JS_SHELLCODE.BU exploits a vulnerability in Microsoft OWC to download JS_SHELLCODE.BV.

      Initial analysis done by Threat Analyst Jessa De La Torre shows that the scripts above may be unknowingly downloaded through either Firefox or Internet Explorer .

      According to Mozilla, a Firefox user reported suffering from a crash that developers determined could result in an exploitable memory corruption problem. In certain cases after a return from a native function, the just-in-time (JIT) compiler could get into a corrupt state. This could then be exploited by an attacker to run arbitrary code. However, this vulnerability does not affect earlier versions of Firefox, which do not support the JIT feature.

      Firefox 3.5 users can avoid this vulnerability by disabling the JIT compiler as described in the Mozilla Security Blog. This workaround is, however, unnecessary for Firefox 3.5.1 users.

      On the other hand, the vulnerability in Microsoft Video ActiveX Control allows remote code execution if a user views a specially crafted web page with Internet Explorer, executing the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

      Microsoft is aware of attacks attempting to exploit the said vulnerabilities and advises its customers to prevent the OWC from running either manually or automatically using the solution found in Microsoft Knowledge Base Article 973472.

      Trend Micro advises users to refer to the following pages to download updates/patches for the vulnerabilities the aforementioned script files exploit:

      Trend Micro advises users to download the latest scan engine to protect themselves against the above-mentioned exploits.

      Source : Tendmicro by Jovi Umawing

      Serious IE ActiveX Vulnerability Discovered

      July 15, 2009 by  
      Filed under Security News

      Microsoft has warned for Internet Explorer (IE) vulnerability has been discovered and Microsoft still working on patch for this vulnerability. The exploit can hijack a computer remotely if the victim simply visits a compromised a web site through Microsoft’s Video ActiveX Control.


      The exploit can only attack users running on “Windows XP” and “Windows Server 2003“. The Vulnerability affects IE6 and IE7 but not IE8.

      For the mean time, Microsoft has released a temporary work around for Windows XP and Windows Server 2003.

      Click here for more information.