Follow up on: XP Ends, "Heartbleed" Bug Arrives Same Day? - Now Government Takeover Of Software Being Called For 4-9-14 "...taking the responsibility out of the hands of users will keep the Web safer...."It's the future ... for all software...a strategic direction shift" - Now that XP is officially "unprotected", suppose the next thing will be a worldwide XP hack-attack and XP computers will be made out to be a 'threat to global internet security'. Pretty predictable but we'll have to see...[because]...they want the whole world 'clouded up' for the 'new order', and they want it nowwwww. Be aware' [see post]
***
Hackers find first post-retirement Windows XP-related vulnerability
Computerworld - Microsoft on Saturday told customers that cyber-criminals are exploiting an unpatched and critical vulnerability in Internet Explorer (IE) using "drive-by" attacks.
"Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11," the company said in a security advisory.
All currently-supported versions of IE are at risk, Microsoft said, including 2001's IE6, which still receives patches on Windows Server 2003. The same browser will not be repaired on Windows XP, as the operating system was retired from patch support on April 8.
The IE flaw was the first post-retirement bug affecting XP. And that's important.
Because Microsoft will eventually patch the drive-by bug in IE6, IE7 and IE8, then deliver those patches to PCs running Windows Vista and Windows 7, it's likely that hackers will be able to uncover the flaw in the browsers' code, then exploit it on the same browsers running on Windows XP.
-----------------------------------------------------------------------
"Cyber-Criminals" To Blame
Amazing just how quickly the absolutely-predictable XP attack begins - not even three weeks since being put down and the "first post-retirement bug" has already materialized out of thin air. Although the "attack" is not technically on 'XP' directly - maybe that would be even too obvious for the mastermind nwo-ers for the 'first strike' - but is on the most widely used XP browser, Internet Explorer (IE). But here's the catch - it will not be patched for XP, meaning that XP users, for the very first time, will now have to scramble and take 'evasive' actions. The article then goes on to give a few possible 'suggestions' for XP users like changing browsers or tweaking the registry, but is not the reality obvious - the plan to make out XP computers as a "security risk" is already on full speed ahead.
Estimates reportedly are that somewhere around 35% of all computers worldwide still run XP. The Baal-boys of Nether-World Global Cloud Management Inc. are coming after them guns blazing.
Definitely note it because..."It's the future for all software...a strategic direction shift" [see 'follow up' above], says Microsoft [link].
And the thing about that "strategic direction shift": the six-six-six will not build itself. This is how it is being done. Rev. 18:4
-------------------------------------------------------------------------
Proverbs 11:18 'The wicked worketh a deceitful work: but to him that soweth righteousness shall be a sure reward' [cf. Gal. 6:7-8]
***
Hackers find first post-retirement Windows XP-related vulnerability
Computerworld - Microsoft on Saturday told customers that cyber-criminals are exploiting an unpatched and critical vulnerability in Internet Explorer (IE) using "drive-by" attacks.
"Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11," the company said in a security advisory.
All currently-supported versions of IE are at risk, Microsoft said, including 2001's IE6, which still receives patches on Windows Server 2003. The same browser will not be repaired on Windows XP, as the operating system was retired from patch support on April 8.
The IE flaw was the first post-retirement bug affecting XP. And that's important.
Because Microsoft will eventually patch the drive-by bug in IE6, IE7 and IE8, then deliver those patches to PCs running Windows Vista and Windows 7, it's likely that hackers will be able to uncover the flaw in the browsers' code, then exploit it on the same browsers running on Windows XP.
-----------------------------------------------------------------------
"Cyber-Criminals" To Blame
Amazing just how quickly the absolutely-predictable XP attack begins - not even three weeks since being put down and the "first post-retirement bug" has already materialized out of thin air. Although the "attack" is not technically on 'XP' directly - maybe that would be even too obvious for the mastermind nwo-ers for the 'first strike' - but is on the most widely used XP browser, Internet Explorer (IE). But here's the catch - it will not be patched for XP, meaning that XP users, for the very first time, will now have to scramble and take 'evasive' actions. The article then goes on to give a few possible 'suggestions' for XP users like changing browsers or tweaking the registry, but is not the reality obvious - the plan to make out XP computers as a "security risk" is already on full speed ahead.
Estimates reportedly are that somewhere around 35% of all computers worldwide still run XP. The Baal-boys of Nether-World Global Cloud Management Inc. are coming after them guns blazing.
Definitely note it because..."It's the future for all software...a strategic direction shift" [see 'follow up' above], says Microsoft [link].
And the thing about that "strategic direction shift": the six-six-six will not build itself. This is how it is being done. Rev. 18:4
-------------------------------------------------------------------------
Proverbs 11:18 'The wicked worketh a deceitful work: but to him that soweth righteousness shall be a sure reward' [cf. Gal. 6:7-8]
No comments :
Post a Comment