My Twitter Feed

February 27, 2015

News:

Medwed to advise SJC on new committe -

Thursday, February 26, 2015

Students shovel Boston neighborhoods -

Wednesday, February 25, 2015

Entrepreneurial team advances to finals -

Wednesday, February 25, 2015

Smith charged in ’08 murder of Rebecca Payne -

Thursday, February 19, 2015

Snow disrupts classes, city -

Thursday, February 19, 2015

Gender influences professor’s ratings -

Thursday, February 19, 2015

Mentors aid innovators -

Thursday, February 19, 2015

Skateboards made from recyclables -

Thursday, February 12, 2015

Engagement officer chosen -

Thursday, February 12, 2015

NU hosts women’s journal -

Thursday, February 12, 2015

iChip technology combats bacteria -

Thursday, February 12, 2015

Art minor offered abroad in summer -

Thursday, February 5, 2015

Campaign funds research, awareness -

Thursday, February 5, 2015

Engineering program honored -

Thursday, February 5, 2015

Conference unites gamers -

Wednesday, January 28, 2015

Meditation startup relaxes users -

Wednesday, January 28, 2015

Fit NU hosts group workouts -

Wednesday, January 28, 2015

Women’s hockey comes from behind to win 5-2 -

Wednesday, January 28, 2015

Professor’s research focuses on activating social networks -

Thursday, January 22, 2015

New center points students toward financial freedom -

Thursday, January 22, 2015

Internet Explorer Software Update Fixes Bug

Photo courtesy creative commons, Sean MacEntee

By Vanessa Nason, news correspondent

Microsoft released a patch on May 1 to fix the security flaw found in the web browser Internet Explorer (IE) days after it was discovered this past weekend.

IE’s latest vulnerability, found by security researchers, was so severe that the U.S. government issued warnings against the browser’s use. Prior to creating the security patch, The Computer Emergency Readiness Team (CERT), part of the U.S. Department of Homeland Security, recommended switching browsers until a solution was found.

The Office of Information Security at Northeastern reiterated this to members of the Northeastern community via an email and postings on their blog and social media outlets.

Mark Nardone, the Director of Northeastern’s Office of Information Security, stated that this precaution was taken because “the risk of infection [laid] mainly in what is known as a ‘drive-by download’ where a user’s computer is infected by browsing an infected [or] malicious website.”

Users can continue using Internet Explorer once they have installed the patch and rebooted their computer.

The security patch is installed through a regular Microsoft update and is supported by all current versions of Windows operating system as well as Windows XP, which is no longer supported. For users who have enabled automatic updates, no extra steps need to be taken to ensure this patch is installed, however, a Microsoft Security Response Center blog post adds that as an extra precaution, “customers are encouraged to upgrade to the latest version of Internet Explorer, IE 11.”

“These patches have been pushed to all Northeastern managed desktops as of last Friday, May 2,” says Nardone. Northeastern took swift measures as soon as notification of the security flaw was received.

According to Nardone, the Office of Information Security “assessed the impact and executed controls to our perimeter firewall defenses, which effectively blocked any malicious traffic to our NuNet and ResNet segments,” and announcements about the bug and the patch were made available to all students, faculty, and staff.

If you think your computer has been compromised or are having difficulty installing the security patch, Nardone recommends going to the ResNet Helpdesk.

Photo courtesy Sean MacEntee, creative commons.

Print Friendly

Comments

Leave A Comment