Use Hosted Application Using Out-of-Date ActiveX Controls in Internet Explorer (IE)

SYMPTOMS: When you access a local area network (LAN), an intranet share, or an intranet Web site by using an Internet Protocol (IP) address or a fully qualified domain name (FQDN), the share or Web site may be identified as in the Internet zone instead of in the Local intranet zone. For example, this behavior may occur if you access shares or Web sites with Microsoft Internet Explorer or Windows Internet Explorer, with Microsoft Windows Explorer, with a command prompt, or with a Windows-based program when you use an address in any one of the following formats: \\Computer.childdomain.domain.com\Share http://computer.childdomain.domain.com \\157.54.100.101\share file://157.54.100.101/share http://157.54.100.101 This behavior can occur regardless of whether any or all of the following settings are configured: In Microsoft Internet Explorer or in Windows Internet Explorer, you have added the FQDN (or *.domain.com)...
Read More

Internet Explorer begins blocking out-of-date ActiveX controls

As part of our ongoing commitment to delivering a more secure browser, starting September 9th Internet Explorer will block out-of-date ActiveX controls. Note: The original post stated that the ActiveX blocking would begin on August 12th. Please refer to the addendum for further details. ActiveX controls are small apps that let Web sites provide content, like videos and games, and let you interact with content like toolbars. Unfortunately, because many ActiveX controls aren’t automatically updated, they can become outdated as new versions are released. It’s very important that you keep your ActiveX controls up-to-date because malicious or compromised Web pages can target security flaws in outdated controls to collect information, install dangerous software, or by let someone else control your computer remotely. For example, according to the latest Microsoft Security Intelligence Report, Java exploits represented 84.6% to 98.5% of exploit kit-related detections each month in 2013. These vulnerabilities may have been fixed in recent versions, but users may...
Read More