4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“The Worst” Windows Bug Discovered... and Thankfully Fixed

“The Worst” Windows Bug Discovered... and Thankfully Fixed

Microsoft has resolved what a security researcher tweeted was “the worst Windows remote code exec” in his memory. This vulnerability allowed a targeted file to implement remote code execution processes, manipulating the infected system and spreading the infection to other machines. In other word, it’s a bad problem to have. The scariest part: the attack would be triggered if a particular file were to be scanned by the Microsoft Malware Protection Engine.

This vulnerability was uncovered and reported by researchers Tavis Ormandy and Natalie Silvanovich, of the Google Project Zero team. Taking to Twitter, the duo reported that they had made a discovery, reporting it to Microsoft and the Microsoft Security Response Center.

The MSRC confirmed the presence of the vulnerability, discovering that numerous pieces of software within the Microsoft Malware Protection Engine would allow a “specially crafted file” to begin running any code the attacker pleased on the system. This vulnerability was present on essentially every Windows machine, having been found on Windows 7, 8.1, and 10, and even affecting Windows RT.

While Microsoft pushed out this particular update, this story still serves as a reminder to keep all of your solutions up-to-date. There is a digital arms race that is waged between programmers and hackers, where each side tries to gain the upper hand over the other by improving their programs. This is one of the main reasons why your solutions have regular updates released, and why it is so important to implement these updates in a timely manner. Without these updates, your system is left vulnerable to threats that have been made preventable.

4IT can help you to be sure that your company’s systems are updated. We’ll keep an eye out for any updates as well as warning signs of impending threats. For more information, give us a call at 305-278-7100.


Comments 1

Brandon maurio on Friday, 26 May 2017 05:45

It makes me so happy your huge records and aptitude have a present day-day channel for endeavoring into the region. I'm trusting you could keep up this web site online refreshed so clients can come and investigate energizing memories. For Ref college paper writing service

It makes me so happy your huge records and aptitude have a present day-day channel for endeavoring into the region. I'm trusting you could keep up this web site online refreshed so clients can come and investigate energizing memories. For Ref [url=https://www.collegepaperwritingservices.com/]college paper writing service[/url]
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet software Business Computing Business Management Hackers Backup Productivity Hosted Solutions Managed Service Provider Malware Google IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Hardware VoIP Business Continuity Workplace Tips Network Security Mobile Devices User Tips Computer Saving Money Windows 10 Mobile Device Management Miscellaneous Virtualization Upgrade Data Email Server communications Mobile Computing Alert Small Business Save Money Network Microsoft Office Communication Apps Social Media Smartphone Smartphones Managed IT Services Quick Tips Outsourced IT Browser Productivity BYOD Going Green Mobile Office Information Technology Gadgets Office Health Holiday Cybercrime Android Application Ransomware Managed IT Operating System Cybersecurity Chrome The Internet of Things Avoiding Downtime Mobility WiFi Passwords Data Backup Best Practice Disaster Risk Management Tablet Firewall History Telephone Systems Remote Computing Unified Threat Management Data Recovery IT Solutions Automation Spam BDR Search Internet of Things Collaboration Data Management Remote Monitoring Facebook Employer-Employee Relationship Budget Hard Drives Apple Saving Time Hacking Marketing User Error Vendor Management Phishing VPN Wireless Technology Computers iPhone Customer Relationship Management Maintenance Office 365 Big Data Vulnerability Recovery Phone System Content Filtering Money Proactive IT Office Tips Data Security Password Law Enforcement Hosted Solution Wearable Technology IT Support Telephony PowerPoint Printer Virus Tech Support USB Encryption Analytics Two-factor Authentication Gmail Router Government App Bring Your Own Device Google Drive Intranet Antivirus Shortcut Lithium-ion battery Social OneNote Humor Administration Work/Life Balance Social Engineering Current Events Trending Education Net Neutrality Windows 10 Private Cloud Politics Users Personal Information Outlook Windows 8 Wireless Unsupported Software SaaS Excel Cloud Computing Audit Cost Management HaaS Data Breach Save Time Business Intelligence Bandwidth Printer Server Point of Sale Identity Theft IT COnsultant Data Protection Flexibility Laptop Retail Computer Repair Samsung Wi-Fi Emergency Instant Messaging Artificial Intelligence Emails Display HIPAA Blockchain Social Networking Applications Commerce Entertainment Augmented Reality Benefits hacker DDoS Computer Accessories Paperless Office Transportation Compliance Data Loss Mouse Fax Server Computer Care Battery Managed IT Services Robot Workplace Google Docs eWaste Data Storage Redundancy Automobile Managing Stress Streaming Media End of Support Uninterrupted Power Supply online currency Legal Internet Exlporer Network Congestion Travel Help Desk Solid State Drive Update Customer Service Biometrics Sports Efficency Virtual Reality Cortana Networking Project Management Meetings Website Evernote WIndows Server 2008 Human Resources How To IT consulting Chromecast MSP Upgrades Windows Ink Running Cable risk management Comparison Workers Training Patch Management Reliable Computing Administrator OneDrive Colocation Amazon Consultant Google Maps The Blindside Of Bloatware Co-managed IT Specifications Hard Drive Updates Company Culture Regulation Black Market Access Identities Touchscreen Software as a Service IT Security Lifestyle Uograde Conferencing Images Ebay Microsoft Word Cleaning Sync Branding Computing IoT Sales Distributed Denial of Service Experience iOS Keyboard Managed IT Service Avoid Downtime Gifts Device Security Adobe WIndows 7 Inbound Marketing Music Computer Fan Storage Hiring/Firing Regulations Devices Licensing Data storage Value Microsoft Excel Wiring Books Dark Web Smart Technology Screen Mirroring Video Games Cameras Information Credit Cards Spyware Twitter Document Management User Advertising Debate File Sharing Science Surge Protector Cast Virtual Desktop Presentation FAQ Fraud Mobile Device Television Bluetooth Windows 10s Best Available Touchpad 3D Printing systems IT Technicians Managed Security Nanotechnology Scam Charger Edge Tablets SharePoint Hard Disk Drive hack Root Cause Analysis Employer Employee Relationship HBO ISP Nokia Wireless Charging Ciminal NFL Teamwork Worker Commute best practices Operating Sysytem PDF Busines Continuity CrashOverride WannaCry IT Management Scalability Near Field Communication Files Programming Blogging IT Budget Word data breach Settings Text Messaging Legislation Safety Reputation Microblogging Youtube Shadow IT Relocation Managed Service Provder Language Webinar Tutorial IT service Webinar Tech Term Mobile Domains IT solutions Proactive Professional Services Websites Taxes Gift Giving Buisness Supercomputer Electronic Medical Records