Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How 2 Keystrokes Can Bypass the Security of Windows

How 2 Keystrokes Can Bypass the Security of Windows

Usually, when a troubleshooting feature is put in place, it is meant to assist the user in resolving an issue. However, one such feature in Windows 10 could ultimately lead to more problems, as it also can serve as a free-ride vulnerability for an opportunist bystander.

Security expert Sami Lailo discovered that if someone keys in Shift + F10 during a ‘Feature Update’ in Windows 10, they are able to access a Command Prompt window with Admin privileges. Compounding this with the fact that Microsoft updates disable BitLocker while they are in progress, means that someone could feasibly access the hard disk without the aid of any external device.

If that someone happened to be ill-intentioned, they could potentially wreak havoc through the command-line interface. Admittedly, the perpetrator would have to move quickly, but if they had come in with a plan and the foreknowledge of a Feature Update being implemented, they would have plenty of time to do what they had come to do.

Lailo reached out to Microsoft, and the company is now working to resolve this issue.

The current fix? Don’t leave an updating workstation unattended, despite the long periods of time updates can sometimes take.

Once Microsoft releases a patch, businesses and organizations will want to apply it. Keep in mind, any Total Tech Care clients on our managed services will have the update applied once it is tested. Give us a call at 866-348-2602 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Phishing Windows Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Cloud Computing Server Save Money Passwords Windows 10 Gadgets Saving Money Holiday Tech Term Chrome Virtualization Social Media Managed Service Microsoft Office Automation Managed IT Services Cybercrime Artificial Intelligence Operating System Facebook Computers Health BYOD Wi-Fi Mobile Device Management Networking IT Support Hacking Internet of Things Alert Covid-19 Spam Information Managed Service Provider Office 365 Telephone Systems Remote Information Technology Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Router BDR Human Resources Application Password Money Remote Monitoring Encryption Applications Big Data Data Breach App History Law Enforcement Mobile Computing How To Managed IT Blockchain Remote Computing Apps Paperless Office Mobile Office Data Storage Patch Management Office Tips Government Training Private Cloud VPN IT solutions Entertainment Website Budget Two-factor Authentication Bring Your Own Device Data Management Work/Life Balance Mouse HaaS Vulnerability Windows 7 Google Drive Word Infrastructure Voice over Internet Protocol Servers Wireless Avoiding Downtime Flexibility Gmail Marketing Data Security WiFi Settings Managed Services Save Time Firewall Display USB Virtual Reality Cleaning Apple Employee/Employer Relationship Staff Social RMM Software as a Service Telephone System Machine Learning End of Support User Error Connectivity Conferencing Remote Work Education Physical Security Meetings Safety Scam HIPAA Sports Redundancy Risk Management Keyboard Hacker Vendor Management The Internet of Things Lithium-ion battery Data Protection Vendor CES Samsung Printer Bluetooth Fax Server Remote Workers Data storage Content Management Value Automobile Processor Business Technology SaaS Access Control Spam Blocking Electronic Medical Records Hard Drive Computing Infrastructure Virtual Assistant IT Consultant Authentication Going Green Network Congestion Hiring/Firing eWaste Humor Computing Battery Update Shadow IT Legal Business Intelligence Google Docs Internet Exlporer Wearable Technology Retail Identity Theft Hard Drives Digital Signage Worker Audit Instant Messaging IT Management Robot Excel PDF Biometrics Botnet Augmented Reality IT Plan Virtual Desktop Procurement Proactive IT Workplace Strategy Fraud Net Neutrality Virus Best Practice Remote Worker DDoS Unsupported Software Help Desk YouTube Black Market Printing Unified Threat Management Charger Computer Accessories Cryptocurrency SharePoint Compliance Computer Care Document Management Managed Services Provider OneNote Customer Service Current Events Comparison Solid State Drive Wireless Technology Database Downtime Telephony Environment How to Windows Server 2008 R2 Files File Sharing Antivirus Root Cause Analysis Camera HBO Customer relationships Inventory Knowledge Specifications Windows 8 Music Chromecast Manufacturing Skype Email Best Practices Wire IT service IT Assessment Evernote Printer Server Travel Colocation Uninterrupted Power Supply Data loss Printers Outlook Computer Tips Leadership Managed IT Service Millennials Tablet Troubleshooting Security Cameras Biometric Security Monitor Start Menu Virtual CIO Smart Office Domains OneDrive Wireless Charging Peripheral Loyalty Screen Mirroring Virtual Private Network IaaS Frequently Asked Questions Digital Security Cameras Maintenance Using Data Workforce Books 5G Reputation Mobile Streaming Media Windows 10s Copiers Cables Bloatware Quick Tip Content Tech Support Cast Laptop Project Management Tip of the week Ergonomics Nanotechnology webinar Telecommuting Tablets Emergency Techology Smartwatch OLED Customers Professional Services Public Cloud Development Cortana Entrepreneur Employer Employee Relationship PCI DSS Digital Signature Assessment Audiobook Virtual Machine Touchpad Warranty Windows Server 2008 2FA Shortcut Fiber Optics Employee Cabling Tools HVAC Consultant Messaging Google Apps Cost Management Policy Analysis Social Networking Television Politics Analytics Hypervisor Advertising Administrator Dark mode Devices Trend Micro Default App Notifications Enterprise Content Management Best Available SMS Running Cable WIndows 7 Procedure Accountants Public Computer Saving Time MSP Microchip Regulations dark theme Thought Leadership Shopping Credit Cards Memory Transportation Google Search Rootkit IT Infrastructure Relocation Password Management Computer Fan AI Password Manager FinTech Multi-Factor Security Bing Search Engine Twitter Workers Social Network Benefits Video Games Business Mangement Worker Commute Investment NIST FENG User Employees Smart Tech IBM Experience PowerPoint Employee/Employer Relationships Trending Science Windows Media Player ISP Flash Windows 365 Addiction Amazon Smart Technology Scalability Video Conferencing Recycling Business Owner ROI Wiring Distributed Denial of Service Software Tips Managing Stress Sales Practices Customer Relationship Management Supercomputer Bitcoin Shortcuts NarrowBand Cryptomining Sync Point of Sale Cache Emails Personal Amazon Web Services Analyitcs Search Supply Chain Management Criminal Programming Cameras iPhone Safe Mode GDPR Monitoring Hosted Computing Batteries Windows 8.1 Wireless Internet Netflix Digitize Online Shopping Two Factor Authentication

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code