Microsoft's Internet Explorer 4.0 was hit by its first bug last week, hurtling the company's newly formed "security test team" into emergency patch-up duty. The bug, which Microsoft has dubbed the "buffer-overrun security bug", could leave users vulnerable to malicious HTML code that crashes the browser. It only affects Internet Explorer 4.0 on Windows 95. Martin Gregory, Internet product manager at Microsoft, said there was no cause for alarm. "We discovered the problem on 11 November and immediately began testing with the security test team," he explained. The security test team, which was specially set up this summer to deal with all software security problems, found that the bug only affects users when a URL exceeds 256 characters and begins with res:// (instead of the more common http://). "It's a very unusual and obscure problem," said Martin, who insisted no users have been affected. "In a worse case scenario IE4.0 could crash, but there would be no data loss." Data loss may not be a problem with this particular bug, but Steve Voller, UK managing director at Netscape, claimed his company's tests on IE4.0 have revealed worse problems, including data corruption, but refused to give details. "We know it's not easy to make these problems and just because Microsoft is throwing large sums of money at IE doesn't mean it will get it right," said Voller.
IBM and Technical University of Munich team demonstrate how Shor's algorithm, which can't be cracked by conventional computers, can be solved quickly with quantum computing
Hubble Space Telescope finds superflares from young red dwarfs could strip away planetary atmosphere
Younger stars are 100 to 1,000 times more energetic than when they're older
Two of the big four supermarkets will use the system to control sales of restricted products
PUBG news and updates: November's Update #23 to bring new Skorpion pistol and changes to blue zone visibility
Genuinely useful side-arm coming to PUBG in Update #23