Welcome!

Machine Learning Authors: Yeshim Deniz, Zakia Bouachraoui, Elizabeth White, Pat Romanski, Liz McMillan

Blog Feed Post

DataRecovery.com Offers List of Solutions to Protect Against Flash Exploit in Internet Explorer

Edwardsville, IL, April 30, 2014 --(PR.com)-- DataRecovery.com, a world leader in professional data recovery services, released a list of tips for personal computer users to protect against a recently discovered Adobe Flash exploit in Internet Explorer.

The United States Department of Homeland Security recently warned PC users against using Internet Explorer, as a bug discovered by FireEye Research Labs could allow a hacker to circumvent the security protections in various Windows operating systems. The hack uses Adobe Flash, a popular web browser add-on.

"Many users and small businesses are simply not using Internet Explorer to avoid the exploit, but this is not an effective solution," said Michael Katich, Lead Programmer and Analyst at DataRecovery.com. "If Internet Explorer is your default browser, you're one click away from a serious security risk."

"Even if your default browser isn't Internet Explorer, a hacker could still infiltrate your system," Katich explained. "For instance, a program installed on your computer could instruct Internet Explorer to run, which could then allow unauthorized users direct access to your machine."

DataRecovery.com offers the following solutions to the exploit:

● Disable the Adobe Flash Plugin in Internet Explorer. After clicking the Settings menu in Internet Explorer, click “Manage add-ons,” then find the Adobe Flash plugin and click “Disable.”
● Uninstall Adobe Flash Altogether. Flash can be uninstalled through Windows’ Add/Remove Programs interface. As Flash is a commonly used program, this may be an unrealistic solution, but it’s a viable option for high-security systems.
● Enable Enhanced Protected Mode in Internet Explorer 10 or Later. DataRecovery.com recommends keeping web browsers updated to prevent security issues. Newer versions of the browser have an enhanced protection feature, accessible through the Internet Options menu. On the “Advanced” tab, click “Enable Enhanced Protected Mode” to add an extra layer of protection to the browser.
● Uninstall Internet Explorer. If you do not use Internet Explorer regularly, you can completely uninstall it. Go to Control Panel, click Add or Remove Programs, then click Turn Windows Features On or Off. Depending on your Windows version, you can then un-click Internet Explorer or select the program to uninstall it.

While these steps can protect against current versions of the exploit, DataRecovery.com also recommends regularly updating web browser software and avoiding potential security issues by using firewalls and third-party security programs to mitigate risks.

Datarecovery.com is a world leader in data recovery and computer forensics. With four locations across the US and Canada, the company provides a variety of data recovery services to thousands of clients each year. Visit www.datarecovery.com for more information.

Contact Information:
Datarecovery.com, Inc.
Ben Carmitchel
1-602-635-2020
Contact via Email
www.datarecovery.com
Michael Katich 618-307-0070 ext. 257

Read the full story here: http://www.pr.com/press-release/555943

Press Release Distributed by PR.com

Read the original blog entry...

More Stories By PR.com Newswire

PR.com is a unique website where companies can promote literally everything about their business and/or organization in a one-stop, all inclusive business marketplace. A cross between a public relations and advertising entity, PR.com is a directory of businesses, products and services, jobs and dynamic articles that include exclusive celebrity interviews. In addition, PR.com is one of the most effective and widely used press release distribution services on the Internet. With a full PR.com company profile, each business listed on PR.com has a powerful means by which to generate quality leads as well as gain worldwide and local exposure for all of their products, services and other business information. PR.com offers the best advantages of the Internet on one website.

CloudEXPO Stories
​Blockchain, also known as Distributed Ledger Technology (DLT), can be used for more than just crypto currencies. This presentation discusses how blockchain and the Internet of Things (IOT) can be used for several supply chain management and logistics use cases. Real world examples that utilize the open source project Hyperledger will be discussed.
This session describes how Professional Services organisations can deliver within Technology-as-a-Service (IaaS) constructs, in private and public enterprise cloud scenarios. See how professional services can be packaged and funded by IaaS cash flows, based upon consumption of technology services. Learn how significant, IT infrastructure transformations can be funded through OPEX spending models with multi-year As-a-Services based contracts. Understand how the automation of repeatable services can positively impact the commercial viability of Professional Services within As-a-Service constructs. Hear how innovative IT infrastructure service offerings can elevate the impact of professional services engagements, and accelerate positive business outcomes.
Gym Solutions is a software as a service (SaaS) solution purpose-built to service the fitness industry, with over 1000 clients servicing over 2 million gym members across 40 countries making Perfect Gym Solutions one of the largest and fastest growing SaaS applications in the fitness industry. Their platform is a comprehensive package of modern modular products for the management of fitness clubs, sports facilities and gyms an end- to end solution, revolutionising the way that gyms are managed.
There's no doubt that blockchain technology is a powerful tool for the enterprise, but bringing it mainstream has not been without challenges. As VP of Technology at 8base, Andrei is working to make developing a blockchain application accessible to anyone. With better tools, entrepreneurs and developers can work together to quickly and effectively launch applications that integrate smart contracts and blockchain technology. This will ultimately accelerate blockchain adoption on a global scale.
As the fourth industrial revolution continues to march forward, key questions remain related to the protection of software, cloud, AI, and automation intellectual property. Recent developments in Supreme Court and lower court case law will be reviewed to explain the intricacies of what inventions are eligible for patent protection, how copyright law may be used to protect application programming interfaces (APIs), and the extent to which trademark and trade secret law may have expanded relevance to the cloud. Best practices for intellectual property protection, licensing, and other topics will be presented, including checklists for engineers, product managers, sales/marketing, and other constituencies. Drawing upon his pre-lawyer life as a product manager for cloud based products, the presenter will emphasize those topics believed to be most practically relevant.