4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“The Worst” Windows Bug Discovered... and Thankfully Fixed

“The Worst” Windows Bug Discovered... and Thankfully Fixed

Microsoft has resolved what a security researcher tweeted was “the worst Windows remote code exec” in his memory. This vulnerability allowed a targeted file to implement remote code execution processes, manipulating the infected system and spreading the infection to other machines. In other word, it’s a bad problem to have. The scariest part: the attack would be triggered if a particular file were to be scanned by the Microsoft Malware Protection Engine.

This vulnerability was uncovered and reported by researchers Tavis Ormandy and Natalie Silvanovich, of the Google Project Zero team. Taking to Twitter, the duo reported that they had made a discovery, reporting it to Microsoft and the Microsoft Security Response Center.

The MSRC confirmed the presence of the vulnerability, discovering that numerous pieces of software within the Microsoft Malware Protection Engine would allow a “specially crafted file” to begin running any code the attacker pleased on the system. This vulnerability was present on essentially every Windows machine, having been found on Windows 7, 8.1, and 10, and even affecting Windows RT.

While Microsoft pushed out this particular update, this story still serves as a reminder to keep all of your solutions up-to-date. There is a digital arms race that is waged between programmers and hackers, where each side tries to gain the upper hand over the other by improving their programs. This is one of the main reasons why your solutions have regular updates released, and why it is so important to implement these updates in a timely manner. Without these updates, your system is left vulnerable to threats that have been made preventable.

4IT can help you to be sure that your company’s systems are updated. We’ll keep an eye out for any updates as well as warning signs of impending threats. For more information, give us a call at 305-278-7100.


Comments 1

Brandon maurio on Friday, 26 May 2017 05:45

It makes me so happy your huge records and aptitude have a present day-day channel for endeavoring into the region. I'm trusting you could keep up this web site online refreshed so clients can come and investigate energizing memories. For Ref college paper writing service

It makes me so happy your huge records and aptitude have a present day-day channel for endeavoring into the region. I'm trusting you could keep up this web site online refreshed so clients can come and investigate energizing memories. For Ref [url=https://www.collegepaperwritingservices.com/]college paper writing service[/url]
Already Registered? Login Here
Friday, 20 October 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows Disaster Recovery Innovation IT Support Hardware Business Continuity Workplace Tips VoIP Saving Money Computer Miscellaneous Virtualization User Tips Upgrade Windows 10 Mobile Devices Mobile Device Management Data Server Network Security Mobile Computing Email Microsoft Office Alert Communication Network Save Money communications Quick Tips Smartphones BYOD Going Green Mobile Office Smartphone Information Technology Social Media Android Office Apps Small Business Health Application Ransomware Browser Operating System Gadgets Chrome Outsourced IT Disaster Tablet Firewall Productivity Managed IT Services Avoiding Downtime Managed IT Data Management Remote Computing Unified Threat Management Passwords IT Solutions Cybersecurity Cybercrime Spam Telephone Systems BDR Mobility Risk Management Search WiFi Holiday The Internet of Things Facebook Vendor Management Hard Drives Saving Time Employer-Employee Relationship Budget Automation Remote Monitoring History VPN Hacking Best Practice Apple Big Data Phishing Password Law Enforcement Marketing Hosted Solution Computers Proactive IT Recovery User Error Phone System iPhone Collaboration Customer Relationship Management Office Tips Wireless Technology Social Printer Data Recovery Bring Your Own Device USB Content Filtering Encryption Analytics Telephony Gmail Router Office 365 Humor Data Backup Administration Wearable Technology Lithium-ion battery Money Maintenance PowerPoint Virus Current Events Antivirus Shortcut Tech Support Work/Life Balance Social Engineering Outlook Point of Sale IT COnsultant Private Cloud Government App Computer Repair Cost Management Intranet Bandwidth Data Security Printer Server Laptop Wireless Unsupported Software OneNote Google Drive Audit Cloud Computing Users HaaS Trending Education Net Neutrality Windows 8 Save Time Business Intelligence Windows 10 Identity Theft Data Protection Update Solid State Drive Customer Service Biometrics Augmented Reality Flexibility Vulnerability Retail Virtual Reality Paperless Office Meetings Network Congestion Fax Server Samsung Wi-Fi Workplace Help Desk Emergency Instant Messaging Data Storage Emails Streaming Media Applications HIPAA Uninterrupted Power Supply Entertainment online currency Benefits Politics DDoS hacker Computer Accessories Personal Information Transportation Mouse Compliance Robot Computer Care Battery Social Networking Two-factor Authentication Managing Stress Efficency Automobile SaaS End of Support Excel Internet Exlporer IT Support Travel Display Internet of Things SharePoint Google Maps Amazon Commerce Co-managed IT Wiring Employer Employee Relationship Regulation Sports Worker Commute Teamwork Operating Sysytem Information PDF Busines Continuity Files Near Field Communication Ebay Debate Scalability Networking Sync Data Loss Computing iOS Safety Text Messaging Managed IT Service Chromecast IT consulting Managed IT Services How To Human Resources Adobe Running Cable Computer Fan Upgrades Artificial Intelligence Administrator Reliable Computing Training Licensing Colocation Dark Web Nokia Consultant The Blindside Of Bloatware Screen Mirroring Access Twitter Company Culture Black Market Touchscreen Surge Protector IT Security Cast Windows 10s Television Cleaning Branding Experience Distributed Denial of Service 3D Printing Nanotechnology Keyboard Avoid Downtime Tablets WIndows 7 Hard Disk Drive Music eWaste Root Cause Analysis Inbound Marketing Hiring/Firing ISP HBO Regulations NFL Data storage best practices Hard Drive Books CrashOverride Value Blogging Smart Technology Video Games Programming IT Management Cameras Word User data breach Uograde Images Document Management Data Breach Advertising Science Settings Website Legal Virtual Desktop WIndows Server 2008 Presentation Windows Ink Touchpad Best Available risk management Mobile Device Bluetooth Managed Security IT Technicians Scam OneDrive Patch Management Taxes Buisness Software as a Service Supercomputer Lifestyle Electronic Medical Records IT Budget Google Docs Reputation Webinar Tutorial Microsoft Excel Mobile IT solutions File Sharing Professional Services Shadow IT Relocation Storage Gift Giving IT service Microblogging Youtube Domains Sales Managed Service Provder Webinar