Bleeping Computer: They donate $20,000 to Children International and The Water Project. But money comes from ransomware criminal activity, and the organizations won’t keep it.
Jackson: Microsoft will no longer support new web standards for Internet Explorer and developers by and large are testing on modern browsers
Microsoft urges its users to stop using Internet Explorer for cyber security problems. Chris Jackson in a post on the company’s blog explained that “we’re not supporting new web standards for it and, while many sites work fine, developers by and large just aren’t testing for Internet Explorer these days. They’re testing on modern browsers. So, if we continued our previous approach, you would end up in a scenario where, by optimizing for the things you have, you end up not being able to use new apps as they come out.” Until now, the Redmond giant continued to improve the “debt by default” that was initiated back in 2001, with new version of the browser. But today “as new apps are coming out with greater frequency, what we want to help you do is avoid having to miss out on a progressively larger portion of the web!”
Internet Explorer born in 1995 and in 2003 became the most utilised browser on the market. But in the recent years arrived the competitors and the problems for the cyber security
Microsoft launched Internet Explorer in 1995 on Windows PCs. It was a standout amongst the most broadly utilised internet browsers, and once held 95 percent of the market in 2003. In the last years came a lot of competitors and many problems. Especially on cyber security and on compatibility with the last web standards. The company, however, for a certain period continued developing the browser, as many enterprises used legacy websites with apps that still depend only with Internet Explorer. Since 2015/2016 Microsoft decided to stop the support the browser. This was a big gift to the cybercrime, that exploited some zero-day vulnerabilities to spread cryptocurrency-mining malware and execute a remote code. This could allow an attacker to take the complete control of the infected system.