Just In
- 11 hrs ago Nothing Ear, Ear (a) With ANC, Up to 42.5 Hours of Battery Launched; Check Price and Availability
- 11 hrs ago Google Drive Gets Long-Awaited Dark Mode for Web - Here's How to Activate
- 12 hrs ago Vivo V30e Launch in India Teased 50 MP Sony IMX882 Camera, 5,500 mAh Battery Confirmed
- 12 hrs ago AMD Revamps Business Computing with AI-Fueled Ryzen PRO 8000 Series Processors
Don't Miss
- Finance 1:3 Bonus Share, Rs 13.25/Share Dividend: Buy Maharatna PSU, TP Rs 355, Fundraise Approved
- Lifestyle Kamada Ekadashi 2024 Wishes: Greetings, Messages, Texts, Images, Twitter Status And Instagram Captions
- Sports Who Won Yesterday's IPL Match 33? PBKS vs MI, IPL 2024 on April 17: Mumbai Indians Escape Last-Ditched Fight by Punjab Kings To Win
- Movies Do Aur Do Pyaar OTT Release Date & Platform: When & Where To Watch Vidya Balan’s Film After Theatrical Run?
- News BRS Chief K Chandrasekhar Rao Slams BJP, Says K Kavitha's Arrest Is Vendetta Politics
- Automobiles Aprilia RS 457 Accessories: A Detailed Look At The Prices
- Education Karnataka SSLC Result 2024 Soon, Know How to Check Through Website, SMS and Digilocker
- Travel Telangana's Waterfall: A Serene Escape Into Nature's Marvels
Microsoft releases a new fix for Windows Malware Protection Engine bug
The bug in Malware Protection Engine was discovered by the UK's National Cyber Security Centre.
Microsoft has released a security patch to fix a flaw in its Windows Malware Protection Engine that, if left untreated, can exploit a memory corruption error in the malware scanning tool and hack your system.
The bug in Malware Protection Engine was discovered by the UK's National Cyber Security Centre. The vulnerability (CVE-2017-11937) can affect systems running Windows 7, 8.1, 10 and Server 2016.
A similar flaw was found by Tavis Ormandy, security researcher for Google's Project Zero, in June this year. "According to Microsoft, the vulnerability can be triggered when the Malware Protection Engine scans a downloaded file to check for threats," The registrar reported. In many systems, this happens automatically for all new files. Microsoft recommends all users to immediately install the new security patch.
"There are many ways that an attacker could place a specially crafted file in a location that is scanned by the Microsoft Malware Protection Engine. For example, an attacker could use a website to deliver a specially crafted file to the victim's system that is scanned when the website is viewed by the user," the company said in its advisory FAQ.
An attacker could also deliver a specially crafted file via an email message or in an Instant Messenger message that is scanned when the file is opened. "In addition, an attacker could take advantage of websites that accept or host user-provided content, to upload a specially crafted file to a shared location that is scanned by the Malware Protection Engine running on the hosting server," Microsoft noted.
Source: IANS
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
62,425
-
1,15,909
-
93,635
-
75,804
-
9,999
-
11,999
-
3,999
-
2,500
-
3,599
-
8,893