Microsoft Advises Users to Stop Using Internet Explorer Browser

Microsoft stopped supporting Internet Explorer browser before years, but still, a number of legacy websites with older web apps still depends on Internet Explorer.

Chris Jackson, Microsoft’s calls “perils of using Internet Explorer as your default browser.” He said that we are not supporting new standards anymore with IE anymore.

Nowadays developers even stopped testing their sites for Internet Explorer and they use to test only for the modern browsers.

Microsoft has tried a number of methods to stop businesses that are using Internet Explorer and try pushing them to upgrade their apps, but still IT admins continue to use it as a compatible solution.

“As you can see, by going with the “technical debt by default” approach, we ended up in a scenario whereby if you create a brand-new webpage today, run it in the local intranet zone, and don’t add any additional markup, you will end up using a 1999 implementation of web standards by default. Yikes!”

Hackers exploit vulnerability with Internet Explorer (CVE-2018-8174) to embed a cryptocurrency-mining malware to mine Monero by Compromising Windows PC.

Another Zero-day in Internet Explorer allows remote code execution that allows an attacker could execute arbitrary code and take the complete control of the infected system.

“Internet Explorer is a compatibility solution. We’re not supporting new web standards for it, so, if we continued our previous approach, you would end up in a scenario where, by optimizing for the things you have, you end up not being able to use new apps as they come out,” said Chris Jackson.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000 malicious…

13 minutes ago

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in Taiwan…

52 minutes ago

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords

A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large language…

1 hour ago

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been…

12 hours ago

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government, defense,…

12 hours ago

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of…

12 hours ago