Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

There’s a New Internet Explorer Zero-Day Threat in Town

Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity User Tips Privacy Communication Malware Data Microsoft Efficiency Google Internet Tech Term Mobile Device Smartphones Hardware Computer Hackers Windows 10 Innovation Ransomware IT Support Users Email Cybersecurity Android Cloud Communications Network Mobile Devices Business Managed IT Services Business Management Passwords Small Business Software Browser Workplace Tips Applications Outsourced IT IT Services Collaboration Data Backup Wi-Fi Backup Saving Money Wireless Social Media Information Holiday Data recovery Internet of Things Hosted Solutions Smartphone Cloud Computing Employer-Employee Relationship Managed IT services Apps VoIp Bandwidth Managed Service Save Money Networking Laptop Value Miscellaneous Gmail Microsoft Office Upgrade Business Intelligence Marketing Blockchain Gadgets Voice over Internet Protocol Data Management Healthcare Managed IT Service Computers Mobility Patch Management BDR Tech Terms Remote Computing G Suite Data Security Net Neutrality RAM Compliance Office Automation Office 365 Paperless Office Cortana Remote Monitoring and Management Artificial Intelligence Analytics Connectivity Virtual Assistant Password Telephony Wireless Charging Company Culture Access Control Facebook Virtualization Cost Management Medical IT Chrome Processor VPN Error instant Messaging Big Data Streaming Media BYOD Windows Server 2008 R2 WannaCry Server Management Millennials Database Government PowerPoint Troubleshooting Health Solid State Drive Server Environment SaaS Edge Virus Tablet Websites Internet Explorer Authorization Chrome OS Settings Inventory Unified Communications Display HP Vulnerabilities Conferencing Backup and Disaster Recovery Downloads Plug-In Wireless Internet Taskbar HIPAA Business Technology Cybercrime Antivirus Sports Update Hard Disk Drive e-waste GDPR Safety Excel Threat IT budget Data Protection Training Benchmarks Document Management Telecommute Tactics Touchscreen Cryptocurrency Physical Security Hard Drives Trends Proactive IT Help Desk National Security Hard Drive Staff Outlook Video Lead Generation Network Attached Storage Telecommuting disposal Bring Your Own Device Personal Information Knowledge Printing Human Resources Battery Tip of the week Mobile Security Microsoft Teams Security Cameras Phishing Microsoft Office 365 Windows 7 eCommerce Content Filtering SSD A.I. Business Continuity Windows Processors Comparison Profitability Customer Service Hybrid Cloud Storage E-Commerce Dongle Paper Employee-Employer Relationship User Tip Operating System Reporting Word Digital Data loss Data Breach Maintenance Time Management Online Shopping Movies Updates Vulnerability Machine Learning Payment Specifications Technology Tips Amazon Eliminating Downtime OneNote Workers Cables Dark Web Voice over IP Ink Electronic Health Records Employees IT Management Managing Stress Wearables Spam Sales Router Authentication Twitter Analysis Certification Spyware Quick Tips Disaster Recovery Regulation Risk Management Alert Printers