Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How 2 Keystrokes Can Bypass the Security of Windows

How 2 Keystrokes Can Bypass the Security of Windows

Usually, when a troubleshooting feature is put in place, it is meant to assist the user in resolving an issue. However, one such feature in Windows 10 could ultimately lead to more problems, as it also can serve as a free-ride vulnerability for an opportunist bystander.

Security expert Sami Lailo discovered that if someone keys in Shift + F10 during a ‘Feature Update’ in Windows 10, they are able to access a Command Prompt window with Admin privileges. Compounding this with the fact that Microsoft updates disable BitLocker while they are in progress, means that someone could feasibly access the hard disk without the aid of any external device.

If that someone happened to be ill-intentioned, they could potentially wreak havoc through the command-line interface. Admittedly, the perpetrator would have to move quickly, but if they had come in with a plan and the foreknowledge of a Feature Update being implemented, they would have plenty of time to do what they had come to do.

Lailo reached out to Microsoft, and the company is now working to resolve this issue.

The current fix? Don’t leave an updating workstation unattended, despite the long periods of time updates can sometimes take.

Once Microsoft releases a patch, businesses and organizations will want to apply it. Keep in mind, any Total Tech Care clients on our managed services will have the update applied once it is tested. Give us a call at 866-348-2602 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Cybersecurity Quick Tips Business Management Users Phishing Upgrade Managed IT Services Windows Data Backup Outsourced IT Ransomware Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Saving Money Holiday Tech Term Gadgets Social Media Chrome Virtualization Managed IT Services Automation Microsoft Office Managed Service Facebook Artificial Intelligence Operating System Cybercrime Computers BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Health Remote Office 365 Telephone Systems Alert Managed Service Provider Information Technology Covid-19 Information Spam BDR Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Router Application Law Enforcement App History Big Data Password Money Human Resources Data Breach Encryption Applications Mobile Computing Remote Monitoring How To Private Cloud Office Tips Training Managed IT Data Storage Patch Management VPN Apps Blockchain Paperless Office Remote Computing Mobile Office Government Voice over Internet Protocol Avoiding Downtime Wireless Bring Your Own Device Data Management Vulnerability Gmail Work/Life Balance Windows 7 Settings Word Two-factor Authentication Flexibility Servers Marketing Google Drive WiFi Mouse HaaS IT solutions Entertainment Website Data Security Infrastructure Budget Meetings USB Risk Management Hacker Save Time Data Protection Vendor The Internet of Things Lithium-ion battery Managed Services Display Conferencing Cleaning Scam Firewall Employee/Employer Relationship End of Support RMM Education Physical Security Vendor Management Telephone System Staff Software as a Service Virtual Reality Apple Safety Machine Learning HIPAA Sports Connectivity Remote Work Social Redundancy Keyboard User Error Samsung YouTube Wearable Technology Black Market Procurement Net Neutrality Retail Hard Drives Workplace Strategy IT Consultant Instant Messaging Value Augmented Reality Help Desk Fraud Robot Excel Spam Blocking Printing Electronic Medical Records Document Management Biometrics Humor Solid State Drive Remote Worker Wireless Technology Virtual Desktop How to Downtime Hiring/Firing Cryptocurrency Managed Services Provider DDoS Data storage Database Automobile Comparison SharePoint Remote Workers Computing Infrastructure CES Business Intelligence Going Green Processor Customer Service Audit Worker Business Technology Content Management Environment IT Management Hard Drive Access Control Fax Server Battery Virus Virtual Assistant Shadow IT Botnet IT Plan Legal Unified Threat Management Authentication Computing SaaS Computer Accessories Internet Exlporer Unsupported Software PDF Charger Network Congestion Update eWaste Compliance Digital Signage Printer Google Docs OneNote Computer Care Proactive IT Bluetooth Identity Theft Current Events Best Practice Telephony Cost Management Experience Root Cause Analysis AI MSP IT Infrastructure Accountants Thought Leadership Bing Credit Cards Social Networking HBO Scalability FinTech Knowledge Microchip Music Social Network Password Management Password Manager Skype Business Owner Multi-Factor Security Data loss NarrowBand Investment Troubleshooting Twitter Running Cable Outlook Search Employees Leadership Search Engine Employee/Employer Relationships iPhone NIST ISP Business Mangement Start Menu Memory Windows 365 Trending Screen Mirroring Video Conferencing Loyalty ROI Smart Tech Books Addiction Shortcuts Amazon Frequently Asked Questions Sales Bitcoin Windows 10s Files Personal Cryptomining Recycling Mobile Point of Sale Cast Supply Chain Management Wiring Chromecast Practices Emergency Cache Amazon Web Services Consultant Tip of the week Science Monitoring webinar Batteries Analytics Public Cloud Colocation Digitize Employer Employee Relationship Safe Mode Uninterrupted Power Supply Criminal Professional Services Windows 8.1 Assessment GDPR Windows Server 2008 R2 Hosted Computing Wireless Internet Distributed Denial of Service Online Shopping Customer Relationship Management Best Available Windows Server 2008 Customer relationships Monitor IT Assessment File Sharing Manufacturing WIndows 7 Tools Analyitcs Email Best Practices Specifications Programming Television Camera Inventory Wire Streaming Media Security Cameras Evernote Computer Tips Reputation Managed IT Service Virtual CIO OneDrive Tech Support Biometric Security Travel Content Millennials Techology Peripheral Public Computer Printers Laptop Antivirus Using Data Transportation Smart Office Wireless Charging Regulations Windows 8 Digital Security Cameras Customers PowerPoint Computer Fan Copiers Windows Media Player Rootkit 5G IT service User Audiobook Workforce Quick Tip Virtual Private Network Touchpad Benefits Smartwatch Cables Tablet Ergonomics Workers Politics FENG Advertising Development OLED Domains Managing Stress Telecommuting PCI DSS IBM Project Management Virtual Machine Nanotechnology Fiber Optics Smart Technology Notifications IaaS Employee Cortana Maintenance Flash 2FA Cameras Bloatware Messaging Cabling Digital Signature Software Tips Policy Supercomputer Warranty Hypervisor Relocation Trend Micro HVAC Google Apps Sync Tablets Dark mode Emails Entrepreneur SMS Default App Analysis Devices Video Games Procedure Administrator Saving Time Shopping Two Factor Authentication Enterprise Content Management Google Search Shortcut Worker Commute dark theme Printer Server Netflix

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code