Tuesday, September 18, 2012

PSA: Stop using IE.

Are you able to manage your computer and settings, such that you can follow along this tiny snippet of instructions to work around IE's (v.7 - 9) current vulnerability?
Deploy the Enhanced Mitigation Experience Toolkit
Enhanced Mitigation Experience Toolkit (EMET) is a utility that helps prevent vulnerabilities in software from successfully being exploited by applying in-box mitigations such as DEP to applications configured in EMET.
At this time, EMET is provided with limited support and is only available in the English language. For more information, see Microsoft Knowledge Base Article 2458544.
Configure EMET for Internet Explorer from the EMET user interface
To add iexplore.exe to the list of applications using EMET, perform the following steps: 
1. Click Start, All Programs, Enhanced Mitigation Experience Toolkit, and EMET 3.0.   
2. Click Yes on the UAC prompt, click Configure Apps, then select Add. Browse to the application to be configured in EMET. 
For 32-bit installations of Internet Explorer the location is:
C:\Program Files (x86)\Internet Explorer\iexplore.exe 
Note For 32-bit systems, the path is c:\program files\Internet Explorer\iexplore.exe 
For 64-bit installations of Internet Explorer the location is:
C:\Program Files\Internet Explorer\iexplore.exe 
3. Click OK and exit EMET.
 If that snippet looked like a foreign language, you might jut want to take security blogger Brian Krebs' advice:
"Using a non-IE browser such as Chrome, Firefox, Opera or Safari is a far safer approach, at least until Microsoft releases a proper patch for this flaw."
Every time you start up Chrome, it automatically checks for the most current versions, downloads then installs it.  Chrome may have its own list of vulnerabilities, but they are far fewer because of built-in security measures (which are included in the soon to be released IE 10 (w/ Win8) -- sandboxing).

Note that, even the German government is instructing people to stop using IE.

No comments: