094 90 48200     Get SUPPORT

Aniar IT Services Blog

Microsoft Releases Rare Bug Fix Off of Regular Patch Schedule

Microsoft Releases Rare Bug Fix Off of Regular Patch Schedule

Most of us like to take matters into our own hands, almost to a point where we might refer to ourselves as control freaks. So, when it comes to letting other people or even our own devices update themselves, we tend to click “remind me later” or “don’t ask me again”. Patches however, are a crucial task in the computing era. Keeping everything up-to-date aids your business in staying one step ahead of lurking threats. Recently, Microsoft announced that it had two major security updates which required emergency patches. 

The two vulnerabilities were patched off of Microsoft’s typical “patch Tuesday” due to the urgency. Most Microsoft patches are released on the second Tuesday of the month. The fact that these two were released ahead of time might seem like an insignificant occurrence, but the reality is this event is a major red flag.

Internet Explorer Zero-Day

The most significant patch was for a zero-day vulnerability that was found in Internet Explorer. It may be hard to believe, but people are indeed still using this antique browser to surf the web. The term zero-day suggests that the vulnerability that was discovered, had already been exploited by ill-minded cybercriminals. 

While not much information has been released on the event, Microsoft did call it a remote code execution exploit that, if accessed, could have given a user control of another user’s account. The attack requires phishing someone who is exploring the internet on Internet Explorer, and luring them onto a malicious website. Once there, an attacker would be able to gain access over the victim. 

Internet Explorer is such a forgotten browser that the event did not spark a lot of controversy. This is largely due to the fact that Internet Explorer makes up just two percent of the active market share. However, for the relatively small amount of users that continue to surf, an event like this is still a huge disaster. 

Microsoft Defender DOS Bug

The second patch that Microsoft expedited was a denial of service vulnerability in Microsoft Defender. The antivirus program comes standard in all Windows 10 PCs, and truly is the core of Windows 10’s sterling security record. 

The bug that was discovered wasn’t necessarily obvious, or easily exploitable. In order to do so, the attacker would need the ability to read, understand, and write code. Doing so would allow them to disable Windows Defender components, giving the attacker access. This would give them free rein to do whatever malicious act they chose to deploy. 

Patches aren’t optional. If you are worried about your business’ vulnerability, speak to one of our experts at Aniar IT Services. We have the know-how to keep your software up to date. Give us a call at 094 90 48200 today! 

Tip of the Week: Your Cybersecurity To-Do List
How Cybercriminals Can Add “Be Scammed” to Your Go...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 14 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud User Tips Email Productivity Microsoft Network Security Hosted Solutions Internet Innovation Workplace Tips Data Hackers Google Hardware Tech Term Efficiency Communications Managed IT Services Software Data Backup Cybersecurity IT Support Communication IT Services Windows 10 Data Recovery Smartphones Business Mobile Devices Computer Small Business Cloud Computing Malware Smartphone Collaboration VoIP Android Mobile Device Gadgets Artificial Intelligence Backup Outsourced IT Network Internet of Things Users Miscellaneous Server Windows Spam Business Management Phishing Browser How To Saving Money Upgrade Business Continuity Information Managed Service Router Office 365 Chrome BDR Passwords Word Cybercrime Computers Applications Data Storage Encryption Infrastructure History Social Media Mobile Device Management Staff Windows 7 Blockchain Vulnerability Operating System Two-factor Authentication Data Protection BYOD Paperless Office Holiday Facebook Ransomware Microsoft Office Remote Monitoring Connectivity Settings Data Security Money Display Scam Training Managed IT Fraud Software as a Service Business Intelligence Human Resources Update Content Management Quick Tips Keyboard Spam Blocking Botnet VPN Processor Password Disaster Recovery Virtual Assistant Managed IT services Bring Your Own Device Government Redundancy Voice over Internet Protocol Wi-Fi Automation IT Management App Patch Management Telephone Systems Meetings Save Money Social Engineering Augmented Reality Google Drive Avoiding Downtime Apps Education Identity Theft Servers Telephone System Comparison Vendor Private Cloud IT Plan OneNote Help Desk Google Docs Access Control Virtualization Digital Signage Law Enforcement Big Data Sports Machine Learning Cryptocurrency Telephony Website CES Unsupported Software HaaS Virtual Machine Recycling Devices Cryptomining Biometric Security Information Technology Windows Server 2008 R2 Authentication Data loss Google Search Virtual Private Network Computer Fan YouTube Mouse Windows Server 2008 Safe Mode Security Cameras Cache Software Tips Smart Office HBO IT Infrastructure Practices Hypervisor Wireless eWaste Thought Leadership Remote Worker Database Telecommuting Manufacturing Amazon Networking Shortcuts Bandwidth Cortana Alert Save Time Remote Workers FENG Microchip Computer Care Smartwatch Skype Data Breach Wireless Internet Document Management Camera Outlook Investment Charger Hosted Computing Enterprise Content Management Mobility Vendor Management Legal Wiring Business Technology Travel Remote Work Virtual Reality Amazon Web Services Accountants Hard Drive Password Manager Nanotechnology Proactive IT Tools Work/Life Balance Managed IT Service Search Engine Health Start Menu Project Management HIPAA USB Solid State Drive Frequently Asked Questions Recovery ROI Wireless Charging Inventory Password Management Social Sync Multi-Factor Security Saving Time 5G Criminal Windows 10s Firewall Cabling Downtime Business Mangement Smart Tech Screen Mirroring MSP Net Neutrality Millennials Managed Services Provider Digital Signature Bing WiFi Google Apps Employer-Employee Relationship Employee Bitcoin The Internet of Things Electronic Medical Records Wire Audit Physical Security Entertainment Warranty Excel GDPR Hacker NIST Procurement Addiction Unified Threat Management Cables Online Shopping Root Cause Analysis Gmail Cast File Sharing ISP Value Workforce OLED Using Data Credit Cards PDF HVAC Flash Workers Compliance Specifications Batteries Data Management Printer Tip of the week Remote Computing Trending Employee/Employer Relationship Public Cloud Mobile Computing Default App Evernote Cleaning Customer Service Search Mobile Office Regulation Domains CrashOverride Emergency Windows 10 Company Culture Public Speaking Presentation Managed Service Provider Lithium-ion battery Managing Stress Hiring/Firing Printers Wireless Technology Twitter Tech Support Personal Information Safety IBM Fun Productivity Marketing Budget Financial Competition Customer Relationship Management IP Address Hard Drives