4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“The Worst” Windows Bug Discovered... and Thankfully Fixed

“The Worst” Windows Bug Discovered... and Thankfully Fixed

Microsoft has resolved what a security researcher tweeted was “the worst Windows remote code exec” in his memory. This vulnerability allowed a targeted file to implement remote code execution processes, manipulating the infected system and spreading the infection to other machines. In other word, it’s a bad problem to have. The scariest part: the attack would be triggered if a particular file were to be scanned by the Microsoft Malware Protection Engine.

This vulnerability was uncovered and reported by researchers Tavis Ormandy and Natalie Silvanovich, of the Google Project Zero team. Taking to Twitter, the duo reported that they had made a discovery, reporting it to Microsoft and the Microsoft Security Response Center.

The MSRC confirmed the presence of the vulnerability, discovering that numerous pieces of software within the Microsoft Malware Protection Engine would allow a “specially crafted file” to begin running any code the attacker pleased on the system. This vulnerability was present on essentially every Windows machine, having been found on Windows 7, 8.1, and 10, and even affecting Windows RT.

While Microsoft pushed out this particular update, this story still serves as a reminder to keep all of your solutions up-to-date. There is a digital arms race that is waged between programmers and hackers, where each side tries to gain the upper hand over the other by improving their programs. This is one of the main reasons why your solutions have regular updates released, and why it is so important to implement these updates in a timely manner. Without these updates, your system is left vulnerable to threats that have been made preventable.

4IT can help you to be sure that your company’s systems are updated. We’ll keep an eye out for any updates as well as warning signs of impending threats. For more information, give us a call at 305-278-7100.


Comments 1

Brandon maurio on Friday, 26 May 2017 05:45

It makes me so happy your huge records and aptitude have a present day-day channel for endeavoring into the region. I'm trusting you could keep up this web site online refreshed so clients can come and investigate energizing memories. For Ref college paper writing service

It makes me so happy your huge records and aptitude have a present day-day channel for endeavoring into the region. I'm trusting you could keep up this web site online refreshed so clients can come and investigate energizing memories. For Ref [url=https://www.collegepaperwritingservices.com/]college paper writing service[/url]
Already Registered? Login Here
Friday, 15 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows Innovation Disaster Recovery IT Support Business Continuity Hardware Workplace Tips VoIP User Tips Computer Saving Money Miscellaneous Virtualization Upgrade Windows 10 Mobile Devices Mobile Device Management Data Server Network Security Mobile Computing Alert Email Microsoft Office Communication Network Save Money Quick Tips communications Small Business Smartphone Social Media Smartphones BYOD Going Green Mobile Office Information Technology Android Health Apps Office Managed IT Services Outsourced IT Application Ransomware Operating System Browser Chrome Gadgets Productivity Disaster Managed IT Tablet Holiday Firewall Mobility WiFi Avoiding Downtime Remote Computing Unified Threat Management IT Solutions Spam Best Practice Passwords Data Management BDR Cybercrime Search Cybersecurity Risk Management Telephone Systems The Internet of Things Facebook Apple Hacking Hard Drives Saving Time Vendor Management Employer-Employee Relationship Budget VPN Remote Monitoring History Automation Big Data Office Tips Money Content Filtering Data Backup Proactive IT Marketing Phishing Password User Error Hosted Solution Computers Collaboration Law Enforcement iPhone Phone System Wireless Technology Customer Relationship Management Recovery Data Recovery Printer USB Antivirus Encryption Analytics Shortcut Gmail Router Bring Your Own Device Social Government Lithium-ion battery Humor Telephony Administration Work/Life Balance Wearable Technology Office 365 Vulnerability Current Events Maintenance PowerPoint Virus Personal Information Users SaaS Tech Support Windows 8 Audit HaaS Wireless Unsupported Software Outlook Business Intelligence Cloud Computing Google Drive Data Security Save Time App Cost Management Point of Sale Social Engineering Intranet IT COnsultant Data Protection Bandwidth Computer Repair Printer Server Laptop Private Cloud OneNote Trending Education Net Neutrality Politics Two-factor Authentication Managing Stress Transportation Augmented Reality Data Storage Excel Computer Care Battery Robot Paperless Office Automobile Fax Server Travel End of Support Workplace Update Customer Service Streaming Media Biometrics Network Congestion Internet Exlporer Uninterrupted Power Supply Retail online currency Virtual Reality Internet of Things Help Desk Meetings Identity Theft Solid State Drive Flexibility Sports Emails Instant Messaging IT Support HIPAA Entertainment Efficency Samsung Benefits Windows 10 DDoS Wi-Fi Computer Accessories Artificial Intelligence Emergency Social Networking Applications Mouse Compliance Display hacker Adobe Managed IT Services Regulations Amazon Uograde Images IT Security Cleaning Google Docs Computer Fan Co-managed IT Value Experience Licensing Avoid Downtime Cameras Keyboard Lifestyle Microsoft Excel Dark Web User Ebay Music Screen Mirroring Science Virtual Desktop Presentation Computing Hiring/Firing File Sharing Bluetooth Best Available Data storage Wiring IT Technicians Books Cast Smart Technology Video Games Windows 10s Information systems SharePoint Document Management Nanotechnology Advertising Debate Data Breach Tablets Legal Hard Disk Drive Mobile Device hack Teamwork Root Cause Analysis Touchpad Busines Continuity Twitter Managed Security HBO Scam NFL Networking best practices Near Field Communication Surge Protector Cortana CrashOverride Television IT Management Employer Employee Relationship Word Human Resources data breach IT consulting 3D Printing Nokia Legislation Running Cable Worker Commute Settings Operating Sysytem PDF WIndows Server 2008 Windows Ink Scalability risk management Reliable Computing Files ISP Text Messaging Safety Patch Management Bloatware Google Maps How To Chromecast Upgrades Commerce Programming Blogging Regulation Training Software as a Service Branding Administrator Website Consultant Distributed Denial of Service Colocation Hard Drive The Blindside Of Sync Company Culture Data Loss Black Market iOS WIndows 7 Access Inbound Marketing Touchscreen eWaste Managed IT Service Storage OneDrive IT service Shadow IT Sales Redundancy Relocation Webinar Managed Service Provder Domains Webinar Credit Cards Mobile IT solutions FAQ Professional Services Tutorial Buisness Taxes Supercomputer Electronic Medical Records Gift Giving IT Budget Comparison Specifications Reputation Conferencing Microblogging Youtube Gifts