48 Vulnerabilities Resolved On Patch Tuesday

48 Vulnerabilities Resolved On Patch Tuesday

Microsoft’s monthly Patch Tuesday issued resolutions to 48 vulnerabilities in August, including 15 that affected Windows, 25 critical flaws, 21 important flaws, and 27 that allowed for remote execution. This is a lot to consider, but the main jist of this is that lots of threats were fixed, and that your organization shouldn’t risk not implementing them as soon as possible.

Only 15 of the vulnerabilities affected Windows itself, but the others addressed issues with other Microsoft products, including Internet Explorer, Microsoft Edge, SharePoint, SQL Server, Hyper-V, and Kernel. Yet, only two of these flaws affected every single version of Windows and Windows Server, and none of them were being exploited in the wild by hackers.

One of these vulnerabilities demands your immediate attention, though, and that is the one that has your Windows Search feature in its crosshairs. This vulnerability, coded by Microsoft as CVE-2017-8620, can use the Server Management Block (SMB) to remotely control a system, be it a Windows Server unit or a Windows workstation. Since the flaw isn’t located in SMB itself, it isn’t affected by other threats like the notorious WannaCry ransomware and NotPetya.

This Windows advisory claims that the vulnerability takes advantage of the way that Windows Search works with objects in memory. A hacker can send customized messages through the Windows Search function to change user permissions. They can then take full advantage of their permissions to install, remove, or change applications on any infected device. They can also view, change, or delete any data that’s stored on it, or create a new account just for them with full administrator privileges.

A vulnerability like this is exactly what a hacker wants. They can basically take full control over a victim’s computer with minimum trouble. If you implement patches and security updates as they are released, you shouldn’t have anything to worry about. Does your business have an organized approach to implementing security patches? If not, there are solutions available that you can use to keep security at a maximum.

Outsourced IT often includes remote patching and maintenance that can be used, even by small businesses. Even better, it does this without costing your business an arm and a leg. Enterprise-level solutions are often the only way for your business to thrive in a world filled with competition, but that’s because they provide a significant benefit to your organization that you can’t afford to ignore. We can improve your network security in the same way as an internal IT department, but without the costs associated with adding new salaries to your budget. Computerware can help your organization implement new security solutions like remote monitoring and maintenance. To learn more, reach out to us at (703) 821-8200.

100 Countries Hit By Android DDoS Malware
Tip of the Week: Improving Outlook With Three Tips


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Google Network Security Small Business Efficiency Smartphones Gadgets Quick Tips Mobile Devices User Tips Business Continuity Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Server VoIP Social Media Android Smartphone Mobile Device Management Windows 10 Upgrade Miscellaneous Innovation Unified Threat Management Windows Ransomware Operating System Remote Monitoring Communication Holiday Passwords Mobile Computing Remote Computing Collaboration WiFi Vendor Management BYOD Apps Marketing Facebook The Internet of Things Cybersecurity Managed IT services Apple Users Analytics History Firewall Productivity Data Management communications Alert IT Support App Save Money Data Backup Phishing Outsourced IT Internet of Things IT Consultant Data Recovery Automation Managed IT Services Content Filtering Spam BDR Mobile Device Health Bring Your Own Device Office Gmail Bandwidth Big data Outlook Cybercrime Windows 8 Lithium-ion Battery Best Practice Information Technology Hiring/Firing Going Green Maintenance Hard Drives Printer Tech Support Virus Budget Wireless Technology Antivirus Search Artificial Intelligence Managed IT Browser Tech Term Employer-Employee Relationship Encryption Money Hacking Cost Management IBM Office 365 Computers Help Desk Phone System Update Recovery Cloud Computing Save Time Networking Humor Document Management Legal Running Cable Proactive IT Saving Time Training SaaS VPN Travel Intranet Administration Customer Service Two-factor Authentication Education It Management Hard Drive Law Enforcement Risk Management Compliance Website Government Data storage Business Intelligence Flexibility Black Market Digital Payment Fax Server iPhone Word Laptop Downtime Data Breach Password Cortana Windows 10 Business Growth Comparison Tablet Project Management Excel Hacker Company Culture Computer Repair Regulations Social Networking Augmented Reality Paperless Office Telephone Systems PowerPoint User Access Control Disaster Twitter End of Support Hosted Solution Robot Current Events Wireless Data Security Securty DDoS Mobility Blockchain Solid State Drive Avoiding Downtime Social Engineering Data Loss Chromebook Applications Scam Chrome Lifestyle Retail Redundancy Cryptocurrency Computing Infrastructure Hack Google Docs Pain Points Router How To eWaste Value Private Cloud Computer Accessories Experience Digital Monitors Cleaning Office Tips Telephony Websites Trending Customer Relationship Management Taxes Processors Start Menu Mouse Tech Terms USB Mobile Technology YouTube Distributed Denial of Service Statistics Sports Gaming Console Presentation Software as a Service Programming Unified Communications Settings Network Congestion Computing Public Cloud Uninterrupted Power Supply Virtual Desktop Text Messaging Specifications Safety Webcam Bitcoin Identity Theft Social Vulnerabilities Streaming Media IT service Documents Data Protection Heating/Cooling User Error Google Maps Business Technology Co-managed IT Politics Storage Patch Management Virtual Reality Emails Bluetooth Inbound Marketing Automobile Net Neutrality Motion Sickness Best Available Keyboard Assessment SharePoint Adminstration Pirating Information Scalability Screen Reader Device Management Leadership Piracy Google Calendar Business Managemenet Deep Learning Messenger Tracking Domains Smart Tech Content Management Tip of the week Work/Life Balance Rental Service Meetings Public Speaking HTML Touchscreen News Visible Light Communication Memory Fiber-Optic Database VoIP Download Web Server Shortcut Mobile Security Consultation Evernote IT consulting Best Practives Cabling Conferencing Knowledge online Currency Entrepreneur Software License Technology Tips Books Workers Troubleshooting Multi-Factor Security Virtual Assistant Wi-Fi Administrator Audit LinkedIn CIO Upselling Microserver Supercomputer HIPAA Devices Fake News Advertising Flash Environment Fraud Tactics Microchip Competition UTM Data Warehousing Windows XP Video Surveillance Machine Learning Worker Electronic Payment Monitoring Staffing Google Wallet IT Plan Access Skype Displays Get More Done Reading Samsung Business Owner Legislation Emergency Archive Hard Drive Disposal Society Saving ZTime Computer Care Micrsooft Turn Key Employer Employee Relationship IP Address Accountants Microsoft Excel Printer Server G Suite email scam Addiction Harddrive Hacks Physical Security Application Multi-factor Authentication Google Drive Point of Contact Windows Server 2008 Trojan Debate Licensing Human Resources Management Drones Botnet Migration Spyware Mobile Payment GPS Relocation Tablets Wireless Headphones Vulnerability Organize Banking Electricity Printing File Sharing Equifax Permissions Language External Harddrive Sync Notifications CCTV Digital Signature Device security Windows 7 Analytic Healthcare Recycling Business Metrics Computer Malfunction Teamwork Desktop cache Television Product Reviews switches Writing 3D Ebay Reliable Computing Entertainment Nanotechnology Music Thin CLient WannaCry Downloads Upgrades Startup Read Smart Phones Webinar In Internet of Things Business Cards Time Management Freedom of Information LiFi PDF Unified Threat Management Backup and Disaster Recovery Corporate Profile CrashOverride 3D Printing Capital Productuvuty