MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“The Worst” Windows Bug Discovered... and Thankfully Fixed

“The Worst” Windows Bug Discovered... and Thankfully Fixed

Microsoft has resolved what a security researcher tweeted was “the worst Windows remote code exec” in his memory. This vulnerability allowed a targeted file to implement remote code execution processes, manipulating the infected system and spreading the infection to other machines. In other word, it’s a bad problem to have. The scariest part: the attack would be triggered if a particular file were to be scanned by the Microsoft Malware Protection Engine.

This vulnerability was uncovered and reported by researchers Tavis Ormandy and Natalie Silvanovich, of the Google Project Zero team. Taking to Twitter, the duo reported that they had made a discovery, reporting it to Microsoft and the Microsoft Security Response Center.

The MSRC confirmed the presence of the vulnerability, discovering that numerous pieces of software within the Microsoft Malware Protection Engine would allow a “specially crafted file” to begin running any code the attacker pleased on the system. This vulnerability was present on essentially every Windows machine, having been found on Windows 7, 8.1, and 10, and even affecting Windows RT.

While Microsoft pushed out this particular update, this story still serves as a reminder to keep all of your solutions up-to-date. There is a digital arms race that is waged between programmers and hackers, where each side tries to gain the upper hand over the other by improving their programs. This is one of the main reasons why your solutions have regular updates released, and why it is so important to implement these updates in a timely manner. Without these updates, your system is left vulnerable to threats that have been made preventable.

MERIT Solutions can help you to be sure that your company’s systems are updated. We’ll keep an eye out for any updates as well as warning signs of impending threats. For more information, give us a call at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 17 December 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Best Practices Business Computing Hackers Malware Software Network Security Hosted Solutions Backup google Internet Productivity Microsoft Computer Disaster Recovery Managed IT Services Business Continuity VoIP Business IT Support Windows 10 Innovation Outsourced IT User Tips IT Services Email Hardware Mobile Devices Business Management Productivity Windows Managed IT Mobility communications Efficiency Smartphone Ransomware Mobile Device Management Data Backup Telephone Systems Small Business Apps Server Cybercrime Saving Money Save Money browser Hosted Solution Quick Tips Android Virtualization Cybersecurity Operating System Law Enforcement Recovery Password Microsoft Office BYOD Data Chrome Data Recovery BDR Money Information Technology VPN Passwords Smartphones Data Management Gadgets Wireless Holiday Unsupported Software Google Drive Hacking Avoiding Downtime upgrade Cloud Computing Social Health Miscellaneous Work/Life Balance Managed Service Provider Communication Computers Facebook Government Office 365 Budget Politics Data Security Workplace Tips USB Save Time Risk Management Identity Theft Automation Telephony Alert Shortcut search App Office tips Applications Private Cloud Wi-Fi Phishing Firewall Application Proactive IT User Error Current Events Managed IT Services Best Practice Social Media Audit Personal Information Employer-Employee Relationship Automobile Update Two-factor Authentication Network IT solutions Sports Saving Time Google Docs DDoS Cleaning Office Computer Care Hacker Phone System Data Protection Internet Exlporer Solid State Drive Television Collaboration Wireless Technology Social Engineering IT Support Users Encryption Streaming Media Apple iPhone Commerce Mobile Computing WiFi Artificial Intelligence Flexibility Transportation Going Green Windows 10 Bandwidth Cost Management Robot Vulnerability History Spam Remote Computing SaaS End of Support Samsung Antivirus Content Filtering Data Storage Battery Internet of Things HaaS The Internet of Things Compliance Humor Disaster Gmail Data storage Black Market Emails Consultant Sales Cast Smart Technology Adobe tweet Value Data Loss Administration Settings Chromecast Avoid Downtime Shadow IT Marketing calculator Retail Licensing Document Management Twitter control Colocation Experience Webinar Tech Support Conferencing Hard Drives HBO Mobile Files WSJ Lithium-ion battery Exchange Microsoft Excel Administrator Video Games Distributed Denial of Service Virtual Reality IT solutions altivista Gifts Scam Professional Services SBS File Sharing Relocation Music Access Legal IT Management Windows 10s compaq Employer Employee Relationship Travel Nanotechnology Wearable Technology Storage Analytics Keyboard WIndows Server 2008 Instant Messaging Hard Disk Drive hp Credit Cards PDF Computer Accessories Tablets Worker Commute Root Cause Analysis domain Mobile Device Cortana Big Data Patch Management Managing Stress FAQ Text Messaging NFL Augmented Reality Scalability Touchscreen remote Lifestyle Books Business Intelligence Hiring/Firing Outlook eWaste Education Yahoo Vendor Management Word Router Running Cable How To Server 2008 Legislation Managed IT Service Benefits Excel Laptop iOS Uninterrupted Power Supply Ali Rowghani Windows Ink Trending Unified Threat Management Comparison Regulation Touchpad Computer Fan Training Google Maps Reputation Entertainment OneNote Data Breach server installation dvd "cannot install required files" Upgrades Specifications Advertising Electronic Medical Records Screen Mirroring Sync Point of Sale Dark Web stock Company Culture Software as a Service HIPAA Meetings Safety Congratulations Emergency WannaCry Cache Monitors Remote Monitoring Worker Redundancy CrashOverride Thank You

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...