Welcome!

Machine Learning Authors: Zakia Bouachraoui, Liz McMillan, Pat Romanski, William Schmarzo, Yeshim Deniz

Blog Feed Post

DataRecovery.com Offers List of Solutions to Protect Against Flash Exploit in Internet Explorer

Edwardsville, IL, April 30, 2014 --(PR.com)-- DataRecovery.com, a world leader in professional data recovery services, released a list of tips for personal computer users to protect against a recently discovered Adobe Flash exploit in Internet Explorer.

The United States Department of Homeland Security recently warned PC users against using Internet Explorer, as a bug discovered by FireEye Research Labs could allow a hacker to circumvent the security protections in various Windows operating systems. The hack uses Adobe Flash, a popular web browser add-on.

"Many users and small businesses are simply not using Internet Explorer to avoid the exploit, but this is not an effective solution," said Michael Katich, Lead Programmer and Analyst at DataRecovery.com. "If Internet Explorer is your default browser, you're one click away from a serious security risk."

"Even if your default browser isn't Internet Explorer, a hacker could still infiltrate your system," Katich explained. "For instance, a program installed on your computer could instruct Internet Explorer to run, which could then allow unauthorized users direct access to your machine."

DataRecovery.com offers the following solutions to the exploit:

● Disable the Adobe Flash Plugin in Internet Explorer. After clicking the Settings menu in Internet Explorer, click “Manage add-ons,” then find the Adobe Flash plugin and click “Disable.”
● Uninstall Adobe Flash Altogether. Flash can be uninstalled through Windows’ Add/Remove Programs interface. As Flash is a commonly used program, this may be an unrealistic solution, but it’s a viable option for high-security systems.
● Enable Enhanced Protected Mode in Internet Explorer 10 or Later. DataRecovery.com recommends keeping web browsers updated to prevent security issues. Newer versions of the browser have an enhanced protection feature, accessible through the Internet Options menu. On the “Advanced” tab, click “Enable Enhanced Protected Mode” to add an extra layer of protection to the browser.
● Uninstall Internet Explorer. If you do not use Internet Explorer regularly, you can completely uninstall it. Go to Control Panel, click Add or Remove Programs, then click Turn Windows Features On or Off. Depending on your Windows version, you can then un-click Internet Explorer or select the program to uninstall it.

While these steps can protect against current versions of the exploit, DataRecovery.com also recommends regularly updating web browser software and avoiding potential security issues by using firewalls and third-party security programs to mitigate risks.

Datarecovery.com is a world leader in data recovery and computer forensics. With four locations across the US and Canada, the company provides a variety of data recovery services to thousands of clients each year. Visit www.datarecovery.com for more information.

Contact Information:
Datarecovery.com, Inc.
Ben Carmitchel
1-602-635-2020
Contact via Email
www.datarecovery.com
Michael Katich 618-307-0070 ext. 257

Read the full story here: http://www.pr.com/press-release/555943

Press Release Distributed by PR.com

Read the original blog entry...

More Stories By PR.com Newswire

PR.com is a unique website where companies can promote literally everything about their business and/or organization in a one-stop, all inclusive business marketplace. A cross between a public relations and advertising entity, PR.com is a directory of businesses, products and services, jobs and dynamic articles that include exclusive celebrity interviews. In addition, PR.com is one of the most effective and widely used press release distribution services on the Internet. With a full PR.com company profile, each business listed on PR.com has a powerful means by which to generate quality leads as well as gain worldwide and local exposure for all of their products, services and other business information. PR.com offers the best advantages of the Internet on one website.

CloudEXPO Stories
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in multiple vertical markets. Our delegate profiles can be located in our show prospectus.
In today's always-on world, customer expectations have changed. Competitive differentiation is delivered through rapid software innovations, the ability to respond to issues quickly and by releasing high-quality code with minimal interruptions. DevOps isn't some far off goal; it's methodologies and practices are a response to this demand. The demand to go faster. The demand for more uptime. The demand to innovate. In this keynote, we will cover the Nutanix Developer Stack. Built from the foundation of software-defined infrastructure, Nutanix has rapidly expanded into full application lifecycle management across any infrastructure or cloud .Join us as we delve into how the Nutanix Developer Stack makes it easy to build hybrid cloud applications by weaving DBaaS, micro segmentation, event driven lifecycle operations, and both financial and cloud governance together into a single unified st...
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Sold by Nutanix, Nutanix Mine with Veeam can be deployed in minutes and simplifies the full lifecycle of data backup operations, including on-going management, scaling and troubleshooting. The offering combines highly-efficient storage working in concert with Veeam Backup and Replication, helping customers achieve comprehensive data protection for all their workloads — virtual, physical and private cloud —to meet increasing business demands for uptime and productivity.
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of Strategic Alliances at Kentik, discussed tactics and tools to bridge the gap between IoT project teams and the network planning and operations functions that play a significant role in project success.