Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How 2 Keystrokes Can Bypass the Security of Windows

How 2 Keystrokes Can Bypass the Security of Windows

Usually, when a troubleshooting feature is put in place, it is meant to assist the user in resolving an issue. However, one such feature in Windows 10 could ultimately lead to more problems, as it also can serve as a free-ride vulnerability for an opportunist bystander.

Security expert Sami Lailo discovered that if someone keys in Shift + F10 during a ‘Feature Update’ in Windows 10, they are able to access a Command Prompt window with Admin privileges. Compounding this with the fact that Microsoft updates disable BitLocker while they are in progress, means that someone could feasibly access the hard disk without the aid of any external device.

If that someone happened to be ill-intentioned, they could potentially wreak havoc through the command-line interface. Admittedly, the perpetrator would have to move quickly, but if they had come in with a plan and the foreknowledge of a Feature Update being implemented, they would have plenty of time to do what they had come to do.

Lailo reached out to Microsoft, and the company is now working to resolve this issue.

The current fix? Don’t leave an updating workstation unattended, despite the long periods of time updates can sometimes take.

Once Microsoft releases a patch, businesses and organizations will want to apply it. Keep in mind, any Total Tech Care clients on our managed services will have the update applied once it is tested. Give us a call at 866-348-2602 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Gadgets Chrome Virtualization Tech Term Social Media Saving Money Holiday Microsoft Office Managed Service Automation Managed IT Services Operating System Artificial Intelligence Computers Facebook Cybercrime Hacking Wi-Fi BYOD Mobile Device Management Health Networking IT Support Internet of Things Spam Alert Information Office 365 Telephone Systems Remote Information Technology Covid-19 Managed Service Provider Social Engineering Mobility Recovery Employer-Employee Relationship Router Bandwidth BDR Big Data Remote Monitoring Password Money App History Mobile Computing Encryption Applications Data Breach Application Human Resources Law Enforcement How To Managed IT Apps Office Tips Data Storage Patch Management Training VPN Government Remote Computing Blockchain Private Cloud Paperless Office Mobile Office Bring Your Own Device Data Management Work/Life Balance Infrastructure Flexibility Voice over Internet Protocol Marketing Wireless WiFi Vulnerability IT solutions Windows 7 Word Entertainment Website Gmail Budget Google Drive Settings Servers Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS User Error Save Time Machine Learning Meetings Connectivity Remote Work Cleaning Risk Management Hacker Conferencing End of Support The Internet of Things Education Physical Security Lithium-ion battery Scam Safety Data Protection USB HIPAA Vendor Sports Redundancy Managed Services Firewall Keyboard Display Vendor Management Virtual Reality Apple Employee/Employer Relationship RMM Social Telephone System Staff Software as a Service Value Data storage Update Wearable Technology Automobile Spam Blocking Electronic Medical Records Hard Drives Retail Digital Signage Virus Instant Messaging Google Docs Robot Computing Infrastructure Excel Hiring/Firing Identity Theft Unified Threat Management Going Green Computer Accessories Biometrics Procurement Virtual Desktop Workplace Strategy Net Neutrality Battery Augmented Reality DDoS Help Desk Shadow IT Fraud Printing Legal Business Intelligence SharePoint Remote Worker Printer Bluetooth Audit Internet Exlporer Worker IT Management Cryptocurrency Managed Services Provider Botnet Customer Service PDF Database Environment IT Plan Comparison IT Consultant Remote Workers Fax Server Proactive IT CES Unsupported Software Processor Best Practice SaaS Humor YouTube Charger Black Market Content Management Business Technology Hard Drive Access Control Compliance OneNote Computer Care Network Congestion Virtual Assistant Current Events eWaste Document Management Telephony Authentication Wireless Technology Samsung Computing Solid State Drive How to Downtime PCI DSS WIndows 7 Skype Project Management Virtual Machine Files Nanotechnology Telecommuting Chromecast Cortana 2FA Fiber Optics Shortcut Data loss Employee Outlook Cabling Cost Management Leadership Digital Signature Troubleshooting Messaging Policy Start Menu Warranty Hypervisor Social Networking Colocation Uninterrupted Power Supply Loyalty Google Apps Dark mode Trend Micro Screen Mirroring HVAC Frequently Asked Questions Default App Monitor Analysis Books SMS Procedure User Running Cable Mobile Administrator Saving Time PowerPoint Windows 10s Devices Windows Media Player Memory dark theme Shopping Cast Enterprise Content Management Google Search Tip of the week MSP IT Infrastructure Reputation webinar Accountants Streaming Media Emergency AI FinTech Managing Stress Content Professional Services Microchip Public Cloud Thought Leadership Bing Tech Support Employer Employee Relationship Credit Cards Laptop Assessment Password Manager Social Network Techology Password Management Windows Server 2008 Investment Cameras Customers Multi-Factor Security Employees Audiobook Tools Search Engine Employee/Employer Relationships Twitter Science Touchpad Television Business Mangement Windows 365 NIST ISP ROI Smart Tech Trending Video Conferencing Sales Distributed Denial of Service Politics Bitcoin Customer Relationship Management Advertising Addiction Shortcuts Amazon Analyitcs Public Computer Recycling Point of Sale Personal Cryptomining Supply Chain Management Regulations Wiring Printer Server Programming Practices Notifications Transportation Monitoring Batteries Computer Fan Cache Rootkit Amazon Web Services Criminal Windows 8.1 Digitize Safe Mode Antivirus GDPR Windows Server 2008 R2 Relocation Workers Hosted Computing Benefits Customer relationships FENG Wireless Internet Windows 8 Online Shopping Manufacturing IBM Email Best Practices IT Assessment IT service Video Games File Sharing Worker Commute Flash Camera Inventory Smart Technology Specifications Computer Tips Experience Managed IT Service Wire Security Cameras Tablet Evernote Biometric Security Supercomputer Travel Virtual CIO OneDrive Domains Scalability Software Tips Peripheral Business Owner Sync Printers Emails Millennials Digital Security Cameras IaaS Using Data Maintenance Smart Office NarrowBand Wireless Charging Search 5G Bloatware Copiers Consultant Quick Tip Virtual Private Network Analytics iPhone Netflix Two Factor Authentication Workforce Tablets Cables Ergonomics Root Cause Analysis Smartwatch Best Available HBO OLED Entrepreneur Knowledge Music Development

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code