News

Trojan horse rides on unpatched IE flaw

Updated 3 days ago

Attackers are taking advantage of an unpatched vulnerability in Internet Explorer to target users of the ubiquitous Web browser, Microsoft warned late Tuesday.

Malicious software that exploits the security flaw to download a Trojan horse to vulnerable computers has been found on the Internet, according to Microsoft. Detection and removal capabilities for the “TrojanDownloader:Win32/Delf.DH” have been added to Microsoft’s recently launched online security-scanning tool.

“Customers can visit Windows Live Safety Center and are encouraged to use the Complete Scan option to check for and remove this malicious software and future variants,” Microsoft said in its updated security advisory on the issue.

The security bug, exploited by the Trojan downloader, was originally reported in May. The bug was thought to only allow for a denial-of-service attack, which would cause IE to close. However, experts last week raised an alarm on the issue because it was discovered that it could be used to remotely run code on a vulnerable computer.

Read more: ZDNet News

Conclusion

This software provides valuable functionality for users. Whether for personal or professional use, it delivers on its core promises. Regular updates and active development ensure continued relevance. User satisfaction and community support demonstrate its value.

Final Thoughts

Based on its features and performance, this software is worth considering. Evaluate your specific needs and whether this solution addresses them. Try it yourself to determine if it’s the right fit for your requirements.

Key Features

Fast Performance

Optimized for speed and efficiency

Secure & Safe

Built with security in mind

Cross-Platform

Available on multiple platforms

Customizable

Personalize to fit your needs

System Requirements

Download Options

Download information coming soon. Please check back later for download links.
Important: Always download software from official sources. Scan downloaded files with antivirus software before installation.
Published Dec 01, 2005
Last Updated Nov 18, 2025