January 11, 2016 By Larry Loeb 2 min read

Microsoft recently announced that as of Jan. 12, 2016, Internet Explorer (IE) versions 8, 9 and 10 will no longer receive security updates, officially marking the end of life (EOL) for these products. One final security upgrade will be sent out Jan. 12 for all the versions.

The security updates will appear on Windows 7 Service Pack 1 (x32 and x64) and on Windows Server 2008 R2 Service Pack 1 (x32 and x64) Edition, according to a report in SecurityWeek. This update also includes a new EOL upgrade notification feature.

Investigating IE Browser Share

IE still has the greatest share of use on desktops, according to NetMarketShare. That is undoubtedly due to the prevalence of older versions in the mix. When the version usage is broken out, as GlobalStats showed, the picture looks dramatically different.

For example, in 2015, GlobalStats found that IE8 had a 1.8 percent share, IE9 had a 1.31 percent share, IE10 had a 1.12 percent share and IE11 accounted for 6.84 percent. These are all far behind the numbers for Chrome (44.87 percent) and Firefox (10.37 percent). It seems that even if IE is present on desktops, other browsers are actually being used more.

Security Updates Push Users to IE11

Microsoft announced the EOL plans in 2014, so the move to end security updates is not a surprise. Older IE versions have had many security problems including remote code execution, elevation of privilege, information disclosure and security feature bypasses.

Microsoft released a list of reasons to upgrade, and it stresses security in that list. Interestingly, it also emphasizes that IE11 will deal with HTML5 natively, which bypasses the need for Adobe Flash Player, well-known for its history of vulnerabilities. The company added that doing the upgrade will be very economically beneficial for the enterprise.

The upgrade is very simple if automatic updates has been enabled on a machine. But if deployment must be done manually, there is also a planning toolkit available to find and upgrade older browser installations.

Upgrading Is the Way to Go

Even though compatibility issues that may be present with older Web apps, the security benefits of eliminating the use of outdated Web browsers in the enterprise are compelling. This announcement should be the wake-up call that IT pros heed to get the task done.

More from

 It all adds up: Pretexting in executive compromise

4 min read - Executives hold the keys to the corporate kingdom. If attackers can gain the trust of executives using layered social engineering techniques, they may be able to access sensitive corporate information such as intellectual property, financial data or administrative control logins and passwords.While phishing remains the primary pathway to executive compromise, increasing C-suite awareness of this risk requires a more in-depth approach from attackers: Pretexting.What is pretexting?Pretexting is the use of a fabricated story or narrative — a “pretext” — to…

ChatGPT 4 can exploit 87% of one-day vulnerabilities

2 min read - Since the widespread and growing use of ChatGPT and other large language models (LLMs) in recent years, cybersecurity has been a top concern. Among the many questions, cybersecurity professionals wondered how effective these tools were in launching an attack. Cybersecurity researchers Richard Fang, Rohan Bindu, Akul Gupta and Daniel Kang recently performed a study to determine the answer. The conclusion: They are very effective.ChatGPT 4 quickly exploited one-day vulnerabilitiesDuring the study, the team used 15 one-day vulnerabilities that occurred in…

Vulnerability management empowered by AI

3 min read - Vulnerability management involves an ongoing cycle of identifying, prioritizing and mitigating vulnerabilities within software applications, networks and computer systems. This proactive strategy is essential for safeguarding an organization’s digital assets and maintaining its security and integrity.To make the process simpler and easier, we need to involve artificial intelligence (AI). Let's examine how AI is effective for vulnerability management and how it can be implemented.Artificial intelligence in vulnerability managementUsing AI will take vulnerability management to the next level. AI not only…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today