Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How 2 Keystrokes Can Bypass the Security of Windows

How 2 Keystrokes Can Bypass the Security of Windows

Usually, when a troubleshooting feature is put in place, it is meant to assist the user in resolving an issue. However, one such feature in Windows 10 could ultimately lead to more problems, as it also can serve as a free-ride vulnerability for an opportunist bystander.

Security expert Sami Lailo discovered that if someone keys in Shift + F10 during a ‘Feature Update’ in Windows 10, they are able to access a Command Prompt window with Admin privileges. Compounding this with the fact that Microsoft updates disable BitLocker while they are in progress, means that someone could feasibly access the hard disk without the aid of any external device.

If that someone happened to be ill-intentioned, they could potentially wreak havoc through the command-line interface. Admittedly, the perpetrator would have to move quickly, but if they had come in with a plan and the foreknowledge of a Feature Update being implemented, they would have plenty of time to do what they had come to do.

Lailo reached out to Microsoft, and the company is now working to resolve this issue.

The current fix? Don’t leave an updating workstation unattended, despite the long periods of time updates can sometimes take.

Once Microsoft releases a patch, businesses and organizations will want to apply it. Keep in mind, any Total Tech Care clients on our managed services will have the update applied once it is tested. Give us a call at 866-348-2602 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Upgrade Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Cloud Computing Server Save Money Passwords Windows 10 Chrome Virtualization Social Media Saving Money Holiday Gadgets Tech Term Microsoft Office Automation Managed IT Services Managed Service Operating System Computers Facebook Cybercrime Artificial Intelligence Hacking BYOD Internet of Things Mobile Device Management Health Networking IT Support Wi-Fi Spam Office 365 Telephone Systems Remote Information Technology Covid-19 Information Alert Managed Service Provider Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Big Data Remote Monitoring Encryption Applications Data Breach App History Mobile Computing Law Enforcement Application Human Resources Password Money Data Storage Patch Management Office Tips Training Government Blockchain VPN Paperless Office Private Cloud How To Managed IT Remote Computing Apps Mobile Office Vulnerability Windows 7 Word Google Drive Flexibility Marketing Servers Wireless WiFi IT solutions Avoiding Downtime Entertainment Website Gmail Budget Data Security Settings Two-factor Authentication Bring Your Own Device Infrastructure Data Management Work/Life Balance Voice over Internet Protocol Mouse HaaS User Error Conferencing Meetings End of Support Education Physical Security Scam Data Protection Safety Risk Management HIPAA Sports Redundancy Hacker Vendor Management Keyboard The Internet of Things Lithium-ion battery Vendor Managed Services USB Telephone System Display Staff Software as a Service Firewall Machine Learning Save Time Connectivity Remote Work Virtual Reality Employee/Employer Relationship Apple RMM Cleaning Social Fraud Battery Remote Worker Digital Signage Shadow IT Business Intelligence Wearable Technology Legal Hard Drives Retail Cryptocurrency Worker Instant Messaging Virus Internet Exlporer Audit IT Management Robot Excel Unified Threat Management Procurement Biometrics Net Neutrality Computer Accessories PDF Botnet Comparison Workplace Strategy IT Plan Virtual Desktop Help Desk CES Printing Proactive IT Unsupported Software DDoS Business Technology Content Management Best Practice Charger SharePoint Printer Access Control YouTube Black Market Bluetooth Managed Services Provider Virtual Assistant Compliance Computer Care Database Authentication OneNote Current Events Customer Service Remote Workers Document Management Environment Telephony Samsung Solid State Drive Wireless Technology Downtime IT Consultant Fax Server Processor How to Update Value Data storage SaaS Hard Drive Humor Automobile Google Docs Spam Blocking Electronic Medical Records Identity Theft Network Congestion Computing Computing Infrastructure Hiring/Firing eWaste Going Green Augmented Reality Assessment Messaging WIndows 7 Search Engine Cabling Twitter Techology Laptop Business Mangement Customers Windows Server 2008 Policy Shortcut Hypervisor NIST Trend Micro Audiobook Cost Management Smart Tech Tools Trending Dark mode Television SMS Social Networking Default App Addiction Amazon Touchpad Recycling Procedure Saving Time Shopping Wiring Politics Google Search Practices Advertising dark theme Public Computer Running Cable AI User IT Infrastructure PowerPoint Cache Windows Media Player Amazon Web Services Memory Bing Criminal Regulations Notifications FinTech Transportation Safe Mode Rootkit Social Network GDPR Hosted Computing Computer Fan Managing Stress Investment Wireless Internet Online Shopping File Sharing Relocation Workers Employees Benefits Employee/Employer Relationships Camera ISP Cameras Inventory Specifications FENG Windows 365 Evernote IBM Video Conferencing ROI Wire Video Games Science Worker Commute Shortcuts Flash Travel Sales Smart Technology Bitcoin Personal Printers Experience Cryptomining Millennials Point of Sale Wireless Charging Software Tips Supercomputer Distributed Denial of Service Supply Chain Management Customer Relationship Management Smart Office Scalability Business Owner Analyitcs Sync Emails Monitoring Batteries Windows 8.1 Digitize Virtual Private Network Programming Printer Server Workforce NarrowBand Cables Windows Server 2008 R2 Search iPhone Netflix Customer relationships Two Factor Authentication Email Best Practices Antivirus IT Assessment Project Management Manufacturing Nanotechnology Telecommuting Root Cause Analysis Cortana HBO Knowledge Music Windows 8 Managed IT Service Security Cameras Digital Signature Files Skype Computer Tips IT service Virtual CIO OneDrive Warranty Biometric Security Chromecast Data loss Google Apps Outlook Leadership Peripheral Troubleshooting HVAC Tablet Domains Using Data Analysis Colocation Start Menu Uninterrupted Power Supply Digital Security Cameras Loyalty Copiers Administrator 5G Devices Screen Mirroring Monitor Frequently Asked Questions IaaS Quick Tip Books Maintenance Enterprise Content Management Consultant MSP Bloatware Smartwatch Accountants Mobile Windows 10s Ergonomics Development Microchip OLED Analytics Thought Leadership Credit Cards Cast Tablets Password Manager Reputation Tip of the week Streaming Media webinar PCI DSS Emergency Virtual Machine Password Management Fiber Optics Best Available Content Entrepreneur Employee Professional Services Multi-Factor Security Tech Support Public Cloud 2FA Employer Employee Relationship

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code