facebook linkedin twitter

Computerware Blog

Microsoft is Releasing Out-of-Band Security Updates

Microsoft is Releasing Out-of-Band Security Updates

Patching your software is one of the most important, yet ignored, tasks in computing. Keeping all of your software up to date with the latest threat definitions can help your business’ IT stay secure. Recently, in a somewhat atypical move, Microsoft has announced that they have released an emergency out-of-band security update to fix two critical security issues. 

The two vulnerabilities were patched off of Microsoft’s typical “patch Tuesday” schedule that sees the software giant release bug fixes every second Tuesday of the month. The fact that they broke their patch schedule suggests that the two vulnerabilities were critical for their customers. Let’s take a look at the two updates and how they’ll function to secure Microsoft products. 

Internet Explorer Zero-Day

The first, and obviously most significant patch, is a zero-day vulnerability found in Internet Explorer, the antiquated (and much maligned) Internet Browser that comes on most Microsoft operating systems. Since this is a zero-day event, the vulnerability had already been exploited in places. 

Little is known about the vulnerability, but Microsoft did call it a remote code execution exploit that if accessed could give a user control over the user account of another. The attack requires phishing an Internet Explorer user onto a malicious website, but once there, an attacker would be able to gain access over the user account of the visitor. 

Luckily, IE currently has an active market share of under two percent, but attacks have already happened so remaining vigilant about the use of IE, and your network’s patch management is key to keeping this particular vulnerability from causing problems for your organization.

Microsoft Defender DOS Bug

The other issue fixed in the out-of-band patch was a denial of service vulnerability in Microsoft Defender. The antivirus program ships with all Windows 10 PCs and is a core component in Windows 10’s sterling security record. 

The bug itself isn’t much of an issue. To successfully exploit it an attacker would need unfettered access to a computer and the ability to execute some code. It disables Windows Defender components and gives people with access (and the ability to code) the chance to completely take over a system with malware or other more sophisticated programs. 

Keeping your software patched and running smoothly is extremely important. Reach out to our expert IT technicians today to see how Computerware can help you manage your system updates and software management at (703) 821-8200.

Stop Trusting Hackers With Your Smartphone!
Taking a Look at the History of Cybersecurity
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 17, 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Workplace Tips Backup Network Security Managed Service Provider Business Hosted Solutions Productivity Email Malware IT Services Saving Money Efficiency Computer Productivity Google User Tips IT Support Smartphones Innovation Small Business Data Backup Mobile Devices Quick Tips VoIP Gadgets Network IT Support Collaboration Business Continuity communications Microsoft Office Upgrade Social Media Data Recovery Android Disaster Recovery Server Cybersecurity Mobile Office Virtualization Communication Smartphone Mobile Device Management Miscellaneous Phishing Holiday Ransomware Operating System Tech Term Vendor Management Passwords Windows Windows 10 Facebook Outsourced IT Internet of Things Unified Threat Management Remote Monitoring Managed IT Services Apps Automation BDR Mobile Device Analytics Data Management Users BYOD Remote Computing Apple Mobile Computing Managed IT services WiFi Windows 10 History Artificial Intelligence The Internet of Things Marketing Browser Cloud Computing Save Money Firewall Help Desk Alert App Big data Office 365 Training Two-factor Authentication Bandwidth IT Consultant Business Technology Spam Encryption Hard Drives Bring Your Own Device Maintenance Antivirus Printer Access Control Office Health Gmail Managed IT Content Filtering Government Information Technology Going Green Cybercrime Cost Management Information Wireless Technology Saving Time Computers VPN Virus Healthcare Tech Support Search Budget Windows 7 Managed Service Lithium-ion Battery Best Practice Recovery Employer-Employee Relationship Retail Outlook Windows 8 Hiring/Firing Hacking Project Management Networking Humor Travel Education Customer Service Update It Management iPhone Phone System Blockchain Data Loss IBM Money Document Management PowerPoint Legal Proactive IT Running Cable Hacker Regulations Administration SaaS Computing Twitter Intranet Avoiding Downtime File Sharing Hard Drive Wireless Law Enforcement Applications Risk Management Mobility Website Patch Management Solid State Drive Compliance Current Events Conferencing Data storage Save Time Downtime Customer Relationship Management Data Breach Password Augmented Reality Value Wi-Fi Digital Company Culture Websites Management Computer Repair Telephony Machine Learning Social Networking Paperless Office Vulnerabilities Telephone Systems Cooperation Software as a Service Sports Vendor Disaster User Hosted Solution Virtual Desktop End of Support Social Robot Data Security Securty Google Maps DDoS Storage Business Intelligence Social Engineering Excel Digital Payment Scam Black Market Flexibility Voice over Internet Protocol Cryptocurrency Word Router Monitoring Laptop Fax Server Private Cloud Cortana Comparison Tablet Business Growth Trending Virtual Assistant Cleaning Gaming Console Monitors Mouse Office Tips Multi-factor Authentication Telephone Webcam Processors Start Menu Tech Terms Microchip Taxes Text Messaging Statistics Distributed Denial of Service USB Managed IT Service Programming Mobile Technology YouTube Unified Communications Settings Network Congestion Presentation Public Cloud Licensing Uninterrupted Power Supply Specifications Safety Vulnerability Processor Bitcoin Identity Theft Streaming Media Inbound Marketing IT service Documents Data Protection Distribution Entertainment Teamwork Heating/Cooling Professional Services Net Neutrality Virtual Reality Pain Points Downloads Politics Chrome Bluetooth User Error Automobile Co-managed IT Emails Chromebook Redundancy Smart Devices Computing Infrastructure Hack Computer Accessories Memory How To eWaste Google Docs Meetings Lifestyle Experience Download Managed Services Provider Evernote A.I. Books Workers Troubleshooting Recording Optimization LinkedIn Communitications email scam Addiction Administrator Entrepreneur Directions Display Technology Tips Accountants SSID How To Fake News Advertising Flash Best Practives Harddrive Environment Dark Web Free Resource Audit CIO Supercomputer Debate HIPAA Windows XP Wireless Headphones Worker Electronic Payment Health IT Employee/Employer Relationship Skype Staffing Google Wallet Migration Connected Devices GPS Competition Processing Managed Services Archive Data Warehousing Equifax Fleet Tracking External Harddrive Reading Samsung Business Owner Logistics Virtual Machines Emergency Hard Drive Disposal Society IT Assessment Network Management Wasting Time Access Displays Microserver IP Address Cyber security Microsoft Excel G Suite Bookmark Point of Contact Computer Care Micrsooft Device security MSP Employer Employee Relationship Windows Server 2008 Get More Done Nanotechnology Social Network Thin CLient Human Resources Employer/Employee Relationships Drones Desktop Finance Hacks 3D Physical Security Ebay Application Google Play Telephone Service Google Drive Startup Asset Tracking Smart Phones Relocation Tablets Microsoft 365 Printer Server Electronic Health Records Business Cards Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Turn Key Medical IT Trend Micro Recycling Permissions Language Trojan Memes Unified Threat Management Backup and Disaster Recovery Sync Browsers Electricity Analytic Printing Username Screen Reader Customer Resource management Leadership User Tip Proactive Maintenance Product Reviews Organize Gamification Notifications Adminstration CCTV Pirating Information Digital Signature Security Cameras Threats Smart Tech Reliable Computing Solutions Music Piracy Upload Business Metrics Computer Malfunction Navigation Virtual Machine cache Read Television switches Writing eCommerce IT Fiber-Optic Database In Internet of Things Data Analysis Employees WannaCry Upgrades HTML Managing Risk Device Management Time Management Freedom of Information LiFi Telephone System PDF SQL Server Corporate Profile Mobile Security GDPR Multi-Factor Security Cost Scalability Integration Business Managemenet Webinar Software License Trends Motion Sickness Best Available Keyboard Tech Hypervisor Content Management Assessment SharePoint Messenger Tracking Domains Holidays Tip of the week Work/Life Balance Fraud Tactics Upselling Fileless Malware Hybrid Cloud Google Calendar Deep Learning Devices Modem Strategy online Currency Touchscreen News Visible Light Communication Proxy Server Azure VoIP UTM Content Rental Service Video Surveillance Public Speaking Legislation Error Saving ZTime Cabling Electronic Medical Records Transportation Knowledge IT Plan Enterprise Resource Planning Web Server Shortcut Term Consultation IT consulting Capital Personal Information Productuvuty Financial Surveillance Printers Managing Stress CrashOverride Regulation 3D Printing

toner1