Welcome!

Machine Learning Authors: Pat Romanski, Liz McMillan, Yeshim Deniz, Elizabeth White, Zakia Bouachraoui

Blog Feed Post

DataRecovery.com Offers List of Solutions to Protect Against Flash Exploit in Internet Explorer

Edwardsville, IL, April 30, 2014 --(PR.com)-- DataRecovery.com, a world leader in professional data recovery services, released a list of tips for personal computer users to protect against a recently discovered Adobe Flash exploit in Internet Explorer.

The United States Department of Homeland Security recently warned PC users against using Internet Explorer, as a bug discovered by FireEye Research Labs could allow a hacker to circumvent the security protections in various Windows operating systems. The hack uses Adobe Flash, a popular web browser add-on.

"Many users and small businesses are simply not using Internet Explorer to avoid the exploit, but this is not an effective solution," said Michael Katich, Lead Programmer and Analyst at DataRecovery.com. "If Internet Explorer is your default browser, you're one click away from a serious security risk."

"Even if your default browser isn't Internet Explorer, a hacker could still infiltrate your system," Katich explained. "For instance, a program installed on your computer could instruct Internet Explorer to run, which could then allow unauthorized users direct access to your machine."

DataRecovery.com offers the following solutions to the exploit:

● Disable the Adobe Flash Plugin in Internet Explorer. After clicking the Settings menu in Internet Explorer, click “Manage add-ons,” then find the Adobe Flash plugin and click “Disable.”
● Uninstall Adobe Flash Altogether. Flash can be uninstalled through Windows’ Add/Remove Programs interface. As Flash is a commonly used program, this may be an unrealistic solution, but it’s a viable option for high-security systems.
● Enable Enhanced Protected Mode in Internet Explorer 10 or Later. DataRecovery.com recommends keeping web browsers updated to prevent security issues. Newer versions of the browser have an enhanced protection feature, accessible through the Internet Options menu. On the “Advanced” tab, click “Enable Enhanced Protected Mode” to add an extra layer of protection to the browser.
● Uninstall Internet Explorer. If you do not use Internet Explorer regularly, you can completely uninstall it. Go to Control Panel, click Add or Remove Programs, then click Turn Windows Features On or Off. Depending on your Windows version, you can then un-click Internet Explorer or select the program to uninstall it.

While these steps can protect against current versions of the exploit, DataRecovery.com also recommends regularly updating web browser software and avoiding potential security issues by using firewalls and third-party security programs to mitigate risks.

Datarecovery.com is a world leader in data recovery and computer forensics. With four locations across the US and Canada, the company provides a variety of data recovery services to thousands of clients each year. Visit www.datarecovery.com for more information.

Contact Information:
Datarecovery.com, Inc.
Ben Carmitchel
1-602-635-2020
Contact via Email
www.datarecovery.com
Michael Katich 618-307-0070 ext. 257

Read the full story here: http://www.pr.com/press-release/555943

Press Release Distributed by PR.com

Read the original blog entry...

More Stories By PR.com Newswire

PR.com is a unique website where companies can promote literally everything about their business and/or organization in a one-stop, all inclusive business marketplace. A cross between a public relations and advertising entity, PR.com is a directory of businesses, products and services, jobs and dynamic articles that include exclusive celebrity interviews. In addition, PR.com is one of the most effective and widely used press release distribution services on the Internet. With a full PR.com company profile, each business listed on PR.com has a powerful means by which to generate quality leads as well as gain worldwide and local exposure for all of their products, services and other business information. PR.com offers the best advantages of the Internet on one website.

CloudEXPO Stories
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leading global enterprises use Isomorphic technology to reduce costs and improve productivity, developing & deploying sophisticated business applications with unprecedented ease and simplicity.
DevOps has long focused on reinventing the SDLC (e.g. with CI/CD, ARA, pipeline automation etc.), while reinvention of IT Ops has lagged. However, new approaches like Site Reliability Engineering, Observability, Containerization, Operations Analytics, and ML/AI are driving a resurgence of IT Ops. In this session our expert panel will focus on how these new ideas are [putting the Ops back in DevOps orbringing modern IT Ops to DevOps].
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understanding as the environment changes.
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.