Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Before we start making Internet Explorer jokes, we want to mention that there is nothing funny about online threats--particularly those that haven’t been addressed yet by the developers. This newly discovered zero-day threat is called the “Double Kill” Internet Explorer vulnerability. Unfortunately, the Chinese developers who discovered this vulnerability--a computer security company called Qihoo--have been quiet about the details regarding the double-kill IE bug. It’s also difficult to tell if your organization is under threat, as they aren’t revealing any of the warning signs of such an attack.

The only thing known for sure about this threat is that it takes root by using Word documents. It’s likely that this is done through email attachments as well, as email is a major method of transporting threats of all kinds. When the document is opened up, Internet Explorer is opened in the background via some kind of shellcode that downloads an executable file. The vulnerability does all this without showing anything of note to the user, making it a difficult threat to identify, but the effects are well-known. Apparently, the downloaded executable file installs a Trojan horse malware on the user’s device which creates a backdoor into the system.

There are a lot more unknowns than anything else with this vulnerability, though. In particular, professionals aren’t sure if all Word documents are affected by this vulnerability, or if the threat even needs Microsoft Office in order to function as intended. It’s not even known what role Internet Explorer plays in the attack, or if the documents that can trigger this attack are identifiable. All we can tell you is that you need to keep security best practices in mind to keep these kinds of zero-day threats from becoming a problem for your organization.

To start, you should never download an unexpected file from an unexpected sender. This can come in the form of a resume, receipt, or other online document. You can never know for sure what you’re actually downloading, as criminals have been able to spoof email addresses to a dangerous degree in recent years. Just be cautious about everything you can, and augment caution with powerful security tools that can identify potential risks before they become major problems.

To get started with network security, reach out to Symmetric Engineering Group at (813) 749-0895.

Medical IT: How Is HITECH Doing?
Tip of the Week: How to Reduce the Use of Paper in...


Already Registered? Login Here
No comments made yet. Be the first to submit a comment


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Technology Best Practices Managed IT Services Cloud Business Computing Privacy Malware Email Hackers IT Infrastructure Management Hosted Solutions Business Continuity IT Companies in Tampa Internet Business Business Mobility IT Support Services Data Backup Business IT Solutions Software Data Outsourced IT I.T. Management Network Security Productivity Microsoft Productivity IT Professional Services Managed Service Provider Custom Business Solutions Computer Mobile Devices IT Management Tech Term Business Applications IT Business Solutions Ransomware Data Recovery Innovation Technology Consultants Cloud Computing Windows 10 Internet of Things Hardware Managed IT Service in Florida Google Android Managed IT Service Business IT Support Managed IT Windows Disaster Recovery I.T. Support Managed Services in Florida User Tips Backup Workplace Tips Remote Monitoring Dynamic Solutions I.T. Services Small Business IT Risk Management IT Support Services in Tampa Communication Browser Collaboration Holiday IT Support Smartphones IT Services in Florida Smartphone Upgrade Encryption Data Management IT Outsourcing in Tampa IT Support in Tampa Save Money Server Gmail Microsoft Office Network Artificial Intelligence Managed Services Business Management Efficiency IT Service Social Media Mobile Device IT Managed Services Paperless Office Cybersecurity Managed IT Services Managed Services in Tampa Bay Passwords Phishing VoIP BYOD Windows 10 App Mobile Device Management Vendor Management Bandwidth Tampa IT Support Employer-Employee Relationship Antivirus Operating System Website Tech Companies in Tampa Firewall Applications Bring Your Own Device BDR communications Customer Relationship Management Unified Threat Management Office 365 IT Services in Tampa Facebook IT Outsourcing Project Management Vulnerability Business IT Support Services Risk Management Small Business IT Solutions Healthcare Managed Service in Tampa Word Two-factor Authentication Computer Networking Infrastructure Wi-Fi Chrome IT Outsourcing in Florida Tip of the week Government Data Computer Services IT Service Management Content Filtering IT Company Business Plan Scam Apple IT Vendor Management Compliance Unified Communications Data storage Data loss The Internet of Things Settings Saving Money Remote Computing Storage Regulations Wireless Technology Retail IT Management Services Analytics Mobile Computing Help Desk Customer Service Data Security Telephone Systems Wireless WiFi IT Company Blockchain Robot Maintenance Money Office Router Automation Computer Hardware Repair Hosted Solution Managed Service SaaS Quick Tips Information Miscellaneous Apps Document Management IT solutions Big Data File Sharing Information Technology Digital Payment Server Management Budget User Error Presentation VPN Network Management Monitors Network Congestion Mobile Security Solid State Drive Laptop IBM Files LiFi Tablet IT Consulting Smart Technology Managed IT Outsourcing Augmented Reality Assessment IT Support Helpdesk Virtual Private Network Microsoft Virtual Server Hosting in Tampa and Florida Business Continuity Services Remote Monitoring and Management Administration IT Management Service Virtual Desktop Mobility IT Companies in Florida Business Technology Virtual Reality Politics Outlook Remote Workers Printing Net Neutrality Downtime End of Support Virtualization Google Drive Computer Network Services Mouse Uninterrupted Power Supply Computer Support I.T. Company Machine Learning Office Tips Business Application Licensing YouTube Spam Training Search Flexibility Access Control Computer Networking Services HIPAA Social IoT Alert Employees Redundancy Internet Exlporer Computing Company Culture Recovery Patch Management Users How To Chromebook Recycling Cyberattacks SharePoint IT Technicians Managed it Services in Tampa Travel MSP RMM Data Technology IT Tech Support Data Warehousing Hacks Identity Theft Data Breach Cooperation Backups IT Vendor Management in Tampa Sync Sports Development Computer Repair Zero-Day Threat Cost Management Technology Tips Nanotechnology Server Hosting Star Wars Microsoft Affiliate Program Consulting Networking Google Wallet IT Support and Solutions Private Cloud Managing Stress Instant Messaging Specifications Bitcoin Social Networking Safety Marketing OneNote Remote Worker Tech Support Computer Care Firefox Managed Services in Floirda Cortana eWaste Server Hosting in Florida Read Only Statistics Downloads Mirgation Business Continuity Service Providers Managed Service Providers Proactive Writing Tech Terms Health VoIP Technology Consulting Firms Microsoft Excel Current Events Microsoft Business Solutions Education Managed Services Provider Password Touchscreen Technology Laws Information Technology Consulting Staff Legal Network Support in Florida Mobile Device Managment Cables Backup and Disaster Recovery Screen Reader Utility Computing Hotspot Drones IT Managed Service in Tampa Enterprise Content Management Alt Codes Finance Hacking Cabling Black Friday Windows 8 Motherboard Professional Service Dark Data Employee-Employer Relationship ROI IT Company in Tampa Websites Knowledge Management Notes Tampa IT Services Google Maps Bluetooth Multi-Factor Security Migration Tech Company in Tampa Meetings Social Engineering Theft Digital Going Green Fun E-Commerce Unified Threat Management IT Consulting Services Operations Buisness Wires Human Error Careers Undo Distributed Denial of Service Top IT Outsourcing Company Smart Tech Consultation Techology Language Help Desk Support in Tampa Vulnerabilities Typing Authentication Health Care IT Services Mail Merge Cyber Monday IT Managed Service Provider Consulting Services Permissions Managed Service in Florida Experience Enterprise Resource Planning Deep Learning Bookmarks Outsourced Computer Support History User Google Calendar Chatbots IT Consulting Service Hacker WPA3 Financial Domains Spyware Lenovo Hard Drive Features Best Practice Printer Wearable Technology G Suite Trending IT Service in Tampa Permission Jobs Business Growth Competition Corporate Profile Break Fix Connectivity Disaster Resistance Computing Infrastructure Help Desk Support Automobile Halloween Geography Computers Authorization Business IT Solutions Digital Signature Hard Drives Address Modem Application Server Hosting in Tampa Service IT Co-managed IT Superfish Fraud Mobile Favorites Disaster Avoiding Downtime Shortcut Legislation Identity Point of Sale Fleet Tracking Procurement Public Speaking Cache Electronic Health Records Heating/Cooling Servers Google Docs CIO Test Electronic Medical Records WannaCry Dark Web Intranet Time Management Proactive IT Alerts Save Time Scary Stories High-Speed Internet Display Full Service IT Hard Disk Drive Software as a Service Cookies Healthcare IT IT Solutions for Small Business Monitoring IT Support Companies in Tampa Identities Conferencing Gadgets Software Tips Comparison Cryptocurrency Humor USB Samsung Asset Tracking Security Cameras Programming Hiring/Firing Law Enforcement Unsupported Software Physical Security Notifications Thank You Motion Sickness Cameras Mobile Data Personal Information Saving Time Emergency Gadget Error Cybercrime How To Staffing Congratulations Printers CCTV Virus GPS Public Cloud Running Cable Crowdsourcing Upgrades Botnet Twitter Webcam Taxes Telephony Supercomputer I.T. Managament Tracking 5G 3D Printing Emoji Processors IP Address CrashOverride Update IT Budget Black Market Regulation Business Appplications Administrator IT Consultant Refrigeration Managed Servers Work/Life Balance Relocation Lithium-ion Battery Web Server Mobile Office Cleaning

Latest Blog Entry

Are you a person that has traditionally written down things in notebooks? If you are, you probably have dozens of notebooks that are half filled with information, most of which you’ll look at sometime in the future and you’ll be reminded just how helpful that note would have...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login