Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

There’s a New Internet Explorer Zero-Day Threat in Town

Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity User Tips Malware Privacy Data Efficiency Microsoft Communication Tech Term Internet Google Smartphones Hardware Mobile Device Innovation Ransomware Windows 10 IT Support Hackers Computer Email Cybersecurity Android Business Management Managed IT Services Browser Network Passwords Small Business Software Mobile Devices Communications Cloud Business Users Workplace Tips Collaboration IT Services Applications Outsourced IT Backup Smartphone Saving Money Apps Social Media Cloud Computing Bandwidth Managed IT services Data Backup Employer-Employee Relationship Hosted Solutions VoIp Wi-Fi Information Data recovery Internet of Things Wireless Holiday Laptop Managed Service Business Intelligence Blockchain Gmail Marketing Gadgets Save Money Networking Microsoft Office Upgrade Value Company Culture Medical IT Chrome Paperless Office Patch Management Facebook Remote Computing Artificial Intelligence Cost Management Analytics Office Healthcare Virtual Assistant Password Mobility Wireless Charging Voice over Internet Protocol Office 365 Cortana Data Security Net Neutrality Compliance Virtualization VPN Telephony Processor G Suite BDR Data Management RAM Remote Monitoring and Management Computers Miscellaneous Tech Terms Access Control Automation Managed IT Service Connectivity Operating System Business Technology Electronic Health Records Staff Video Dongle Paper Conferencing Wearables Lead Generation Network Attached Storage Authentication Maintenance Analysis Certification Battery Movies Processors Cables Excel BYOD eCommerce Windows Technology Tips Error instant Messaging Managing Stress Troubleshooting Health Customer Service Ink SaaS Telecommuting Authorization Chrome OS Digital Data loss Router Twitter Vulnerability Machine Learning Database Knowledge Plug-In Wireless Internet Online Shopping Updates Streaming Media Tip of the week Vulnerabilities Environment Phishing Update OneNote Government PowerPoint Content Filtering GDPR Spam Employees Websites Internet Explorer Comparison Training IT Management Inventory Unified Communications Cryptocurrency Spyware Cybercrime Proactive IT Help Desk Backup and Disaster Recovery Downloads User Tip Touchscreen e-waste Data Breach Outlook Big Data Windows Server 2008 R2 Sports Personal Information WannaCry Server Management Workers Human Resources Edge Virus Solid State Drive Safety Threat Specifications Security Cameras Server Data Protection Microsoft Office 365 Windows 7 HP Tactics Voice over IP Business Continuity Settings Display Hard Drives Trends disposal Bring Your Own Device Sales Profitability Taskbar Storage E-Commerce HIPAA Microsoft Teams Millennials Employee-Employer Relationship Antivirus Hard Disk Drive Printing Reporting Word Mobile Security Time Management Document Management Telecommute IT budget SSD A.I. Hybrid Cloud Tablet Amazon Eliminating Downtime Physical Security National Security Dark Web Payment Hard Drive Printers Quick Tips Disaster Recovery Regulation Alert Benchmarks