Archive for the ‘windows security’ Category
Last weekend a security researcher publically disclosed a zero-day vulnerability in Windows 10, Windows 8.1 and Server editions after Microsoft failed to patch it in the past three months.
The zero-day memory corruption flaw resides in the implementation of the SMB (server message block) network file sharing protocol that could allow a remote, unauthenticated attacker to crash systems with
Microsoft’s Windows 10, the latest version of Windows Operating System, has been creating waves since it rolled out, and reached to 110 million devices within just 2 months.
If you are a long-time Windows user, you may remember a trick called, ‘God Mode’.
God Mode is an inbuilt, but hidden feature of Windows that provides additional customization options for the operating system.
With Windows 10,
In the wake of a critical Remote Code Execution vulnerability in all supported versions of its operating system platform, Microsoft has just issued an emergency fix.
Yes, it’s time to patch your Windows operating system against an alarming security hole that could allow remote attackers to run malicious code on your computer, thereby taking “complete control of the affected system.”
Security researchers have unearthed a serious security flaw in all supported versions of Windows that could let hackers steal users’ credentials from computers, tablets or servers running any version of Windows operating system, including the as-yet-released Windows 10.
This vulnerability in Windows was first discovered 20 Years ago:
The critical bug, dubbed “Redirect to SMB,” is a
Posted in automated penetration testing, Hacking Windows, man-in-the-middle attack, Redirect to SMB, secure windows, SMB server, Vulnerability, windows security, Windows Server, windows Vulnerability | Comments (0)
Among several vulnerabilities, Microsoft on Tuesday patched a critical vulnerability that could be exploited by hackers to bypass security measures on all versions of Windows operating systems from XP to Windows 10, just by modifying a single bit.
The local privilege escalation vulnerability (CVE-2015-0057) could give attackers total control of the victims’ machines, explains Udi Yavo, the