MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“The Worst” Windows Bug Discovered... and Thankfully Fixed

“The Worst” Windows Bug Discovered... and Thankfully Fixed

Microsoft has resolved what a security researcher tweeted was “the worst Windows remote code exec” in his memory. This vulnerability allowed a targeted file to implement remote code execution processes, manipulating the infected system and spreading the infection to other machines. In other word, it’s a bad problem to have. The scariest part: the attack would be triggered if a particular file were to be scanned by the Microsoft Malware Protection Engine.

This vulnerability was uncovered and reported by researchers Tavis Ormandy and Natalie Silvanovich, of the Google Project Zero team. Taking to Twitter, the duo reported that they had made a discovery, reporting it to Microsoft and the Microsoft Security Response Center.

The MSRC confirmed the presence of the vulnerability, discovering that numerous pieces of software within the Microsoft Malware Protection Engine would allow a “specially crafted file” to begin running any code the attacker pleased on the system. This vulnerability was present on essentially every Windows machine, having been found on Windows 7, 8.1, and 10, and even affecting Windows RT.

While Microsoft pushed out this particular update, this story still serves as a reminder to keep all of your solutions up-to-date. There is a digital arms race that is waged between programmers and hackers, where each side tries to gain the upper hand over the other by improving their programs. This is one of the main reasons why your solutions have regular updates released, and why it is so important to implement these updates in a timely manner. Without these updates, your system is left vulnerable to threats that have been made preventable.

MERIT Solutions can help you to be sure that your company’s systems are updated. We’ll keep an eye out for any updates as well as warning signs of impending threats. For more information, give us a call at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup Business Management Managed IT Services google Productivity Microsoft Disaster Recovery Computer Business Continuity Business communications Mobile Devices VoIP IT Support Outsourced IT Windows 10 User Tips Productivity Hardware Innovation Email IT Services Cybercrime Mobile Device Management Windows Managed IT Small Business Efficiency Data Backup Server Mobility browser Cybersecurity Apps Ransomware Smartphone Internet of Things Save Money Operating System Saving Money Data Recovery Telephone Systems Hosted Solution Passwords Quick Tips Android Virtualization Law Enforcement Information Technology Recovery VPN Phishing Microsoft Office Password Holiday BYOD Data BDR Data Security Money Chrome Office 365 Social Media Communication Best Practice IT Support Budget Smartphones Data Management Facebook Wireless Government Vulnerability Risk Management Unsupported Software Update Gadgets Cloud Computing Google Drive Hacking Avoiding Downtime Automation Work/Life Balance Alert Health Miscellaneous Wi-Fi Managed Service Provider Social Computers upgrade App Collaboration Personal Information The Internet of Things Politics Two-factor Authentication User Error USB Windows 10 Save Time Spam Identity Theft Managed IT Services Wireless Technology Workplace Tips Flexibility Data Breach Shortcut Telephony Social Engineering Firewall Application Office tips Applications Antivirus Private Cloud Current Events History Audit search Proactive IT Compliance eWaste Redundancy Automobile Humor Commerce Disaster Blockchain Saving Time Cortana Employer-Employee Relationship Patch Management Cleaning Office Computer Care Network Phone System Sports Gmail Tech Support Legal Users Excel Encryption Hacker Solid State Drive Internet Exlporer IT solutions Fraud Data Storage Tech Term DDoS OneNote Artificial Intelligence iPhone Cost Management Television Mobile Computing Transportation Data Loss Apple Marketing SaaS Streaming Media Project Management Robot Samsung Google Docs WiFi Content Filtering End of Support Remote Computing Battery Going Green HaaS Data Protection Bandwidth Professional Services Point of Sale remote Company Culture File Sharing Touchpad HIPAA Yahoo IT budget IT Management Black Market Windows 10s Consultant Reputation Advertising Smart Technology Travel Running Cable Nanotechnology Server 2008 Value Storage Maintenance Ali Rowghani Avoid Downtime WIndows Server 2008 Shadow IT Hard Disk Drive Credit Cards Trending Tablets Data storage Document Management Root Cause Analysis Experience Device Security Identities Chromecast FAQ Administration NFL Augmented Reality server installation dvd "cannot install required files" Touchscreen Lifestyle Devices Business Intelligence stock Video Games IoT Outlook Virtual Reality Charger Colocation Hard Drives Scam Word Legislation Music Spyware Managed IT Service Files tweet Language Administrator iOS Lithium-ion battery Wireless Charging Employer Employee Relationship Windows Ink calculator Comparison Analytics Twitter Keyboard Regulation Access Instant Messaging Computer Fan control Evernote Relocation Computer Accessories Google Maps Worker Commute WSJ Mobile Device Specifications Big Data Edge Screen Mirroring Virus Sync Managing Stress Dark Web Exchange Networking PDF Software as a Service Distributed Denial of Service Meetings altivista Scalability Emails Sales Books Ciminal Cast Hiring/Firing Proactive Adobe Education SBS Workers Text Messaging Vendor Management Settings compaq Router How To Retail Updates Benefits Websites Licensing Wearable Technology WannaCry hp HBO Webinar Unified Threat Management Conferencing MSP Microsoft Word Mobile domain Training Microsoft Excel Laptop Entertainment Uninterrupted Power Supply intranet IT solutions Upgrades Gifts Electronic Medical Records Safety Emergency Thank You Worker Congratulations CrashOverride Cache Data Theft Monitors Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...