Modern Application Frameworks, Legacy Browsers and Security Implications
- TCP Congestion Control
- Installing Wireshark on Mac OS X (Yosemite)
- What are Rogue Access Points?
- Two Common Router Security Threats
- Modern Application Frameworks, Legacy Browsers and Security Implications
- What are Covert Channels?
- Mobile Considerations in Network Security Architecture
- Common Bluetooth Vulnerabilities to be Aware of
- Mitigating DoS or Distributed DoS (DDoS) attacks
- DNS Rebinding and Intrusion Detection with Contextual Signatures
Other than keeping older browsers up to date in order to cope with new application frameworks, security implications also must be considered. On January 2016, Microsoft stopped supporting legacy versions of Internet Explorer. This included versions 10 and below. They issued a statement warning that continuous use of Internet Explorer 10, 9 and 8 would leave individuals “at risk of viruses and other malicious software that exploit security flaws and bugs in browsers.”. In January, FedTech also released an article regarding the use of older versions of Internet Explorer being used by government workers and users of Federal websites. Their article warned of the increase in potential vulnerabilities. In the same month, HIPPA Journal released a statement warning that use of Internet Explorer 10 and below would be a violation of HIPAA rules. As of September 2016, market share for IE 8 and 9 combined was less than 9%. Net Market Share (2016).
Organizations both in the public and private sector must continue to adapt in order to keep their infrastructure compatible with newer and not even necessarily bleeding edge technology. They must also realize the vulnerabilities left open if they continue to support legacy browsers that have been abandoned (in terms of support and security patches) by their vendors in order to mitigate potential security threats.