Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Releases Rare Bug Fix Off of Regular Patch Schedule

Microsoft Releases Rare Bug Fix Off of Regular Patch Schedule

Most of us like to take matters into our own hands, almost to a point where we might refer to ourselves as control freaks. So, when it comes to letting other people or even our own devices update themselves, we tend to click “remind me later” or “don’t ask me again”. Patches however, are a crucial task in the computing era. Keeping everything up-to-date aids your business in staying one step ahead of lurking threats. Recently, Microsoft announced that it had two major security updates which required emergency patches. 

The two vulnerabilities were patched off of Microsoft’s typical “patch Tuesday” due to the urgency. Most Microsoft patches are released on the second Tuesday of the month. The fact that these two were released ahead of time might seem like an insignificant occurrence, but the reality is this event is a major red flag.

Internet Explorer Zero-Day

The most significant patch was for a zero-day vulnerability that was found in Internet Explorer. It may be hard to believe, but people are indeed still using this antique browser to surf the web. The term zero-day suggests that the vulnerability that was discovered, had already been exploited by ill-minded cybercriminals. 

While not much information has been released on the event, Microsoft did call it a remote code execution exploit that, if accessed, could have given a user control of another user’s account. The attack requires phishing someone who is exploring the internet on Internet Explorer, and luring them onto a malicious website. Once there, an attacker would be able to gain access over the victim. 

Internet Explorer is such a forgotten browser that the event did not spark a lot of controversy. This is largely due to the fact that Internet Explorer makes up just two percent of the active market share. However, for the relatively small amount of users that continue to surf, an event like this is still a huge disaster. 

Microsoft Defender DOS Bug

The second patch that Microsoft expedited was a denial of service vulnerability in Microsoft Defender. The antivirus program comes standard in all Windows 10 PCs, and truly is the core of Windows 10’s sterling security record. 

The bug that was discovered wasn’t necessarily obvious, or easily exploitable. In order to do so, the attacker would need the ability to read, understand, and write code. Doing so would allow them to disable Windows Defender components, giving the attacker access. This would give them free rein to do whatever malicious act they chose to deploy. 

Patches aren’t optional. If you are worried about your business’ vulnerability, speak to one of our experts at Total Tech Care. We have the know-how to keep your software up to date. Give us a call at 866-348-2602 today! 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Server Save Money Data Recovery Cloud Computing Passwords Windows 10 Saving Money Holiday Social Media Chrome Gadgets Virtualization Tech Term Automation Microsoft Office Managed IT Services Managed Service Facebook Operating System Cybercrime Artificial Intelligence Computers BYOD Mobile Device Management Networking IT Support Hacking Internet of Things Health Wi-Fi Office 365 Remote Telephone Systems Managed Service Provider Information Technology Covid-19 Information Alert Spam Bandwidth Router Social Engineering BDR Mobility Recovery Employer-Employee Relationship Application Encryption Applications App History Data Breach Big Data Law Enforcement Human Resources Mobile Computing Password Remote Monitoring Money Data Storage Patch Management Office Tips Training Blockchain Government Paperless Office VPN Private Cloud How To Managed IT Remote Computing Mobile Office Apps Vulnerability Windows 7 Word Google Drive Wireless Servers Gmail Avoiding Downtime Settings Data Security Flexibility Two-factor Authentication Infrastructure Marketing Voice over Internet Protocol Bring Your Own Device WiFi Data Management Mouse HaaS IT solutions Work/Life Balance Entertainment Website Budget USB Meetings Data Protection Conferencing End of Support Scam Education Physical Security Risk Management Safety Hacker Sports HIPAA Redundancy Keyboard The Internet of Things Vendor Management Vendor Lithium-ion battery Managed Services Telephone System Staff Software as a Service Display Machine Learning Firewall Connectivity Remote Work Employee/Employer Relationship Save Time RMM Virtual Reality Apple Social Cleaning User Error Cryptocurrency Wearable Technology Battery Hard Drives Shadow IT Retail IT Consultant Procurement Legal Business Intelligence Instant Messaging Workplace Strategy Robot Comparison Net Neutrality Excel Audit Internet Exlporer Worker Humor CES IT Management Biometrics Help Desk Printing Virtual Desktop PDF Botnet Business Technology Content Management IT Plan DDoS Access Control Managed Services Provider Proactive IT Virtual Assistant SharePoint Unsupported Software Best Practice Authentication Database YouTube Charger Remote Workers Black Market Compliance Customer Service Processor OneNote Environment Computer Care Update Current Events Document Management Telephony Fax Server Virus Hard Drive Solid State Drive Wireless Technology Samsung How to Unified Threat Management Google Docs Downtime SaaS Computer Accessories Identity Theft Value Computing Data storage Spam Blocking Electronic Medical Records Automobile Network Congestion Augmented Reality eWaste Fraud Computing Infrastructure Hiring/Firing Printer Going Green Bluetooth Remote Worker Digital Signage Procedure Recycling Saving Time Techology Cost Management Laptop Assessment Wiring dark theme Practices Shopping Windows Server 2008 Social Networking Google Search Customers Amazon Web Services IT Infrastructure Cache AI Audiobook Tools Safe Mode FinTech Criminal Bing Touchpad Television GDPR Running Cable Hosted Computing Social Network Online Shopping Investment Advertising Memory Wireless Internet Politics File Sharing Employees Employee/Employer Relationships Public Computer Notifications Transportation Camera Windows 365 Inventory Regulations Specifications ISP Evernote ROI Computer Fan Rootkit Wire Video Conferencing Sales Bitcoin Travel Shortcuts Science Benefits Printers Point of Sale Consultant Personal Millennials Cryptomining Relocation Workers Analytics Wireless Charging FENG Smart Office Supply Chain Management Monitoring Batteries Video Games IBM Smart Technology Virtual Private Network Windows 8.1 Distributed Denial of Service Best Available Digitize Worker Commute Flash Customer Relationship Management Workforce Experience Cables Windows Server 2008 R2 Analyitcs WIndows 7 Customer relationships Scalability Software Tips Programming Supercomputer Emails Project Management Email Best Practices Nanotechnology IT Assessment Business Owner Sync Telecommuting Manufacturing Cortana NarrowBand Computer Tips Antivirus Digital Signature Managed IT Service Search Security Cameras iPhone Netflix Windows 8 Two Factor Authentication Warranty Virtual CIO OneDrive Biometric Security IT service PowerPoint Google Apps Root Cause Analysis Windows Media Player User HVAC Peripheral Music Digital Security Cameras Analysis Using Data HBO Knowledge Files Tablet Administrator Devices Copiers Skype 5G Domains Data loss Chromecast Managing Stress Enterprise Content Management Quick Tip Troubleshooting MSP Ergonomics Accountants Outlook Smartwatch Leadership Colocation Uninterrupted Power Supply Microchip IaaS Thought Leadership Development Start Menu Maintenance Cameras Credit Cards OLED Password Management PCI DSS Password Manager Virtual Machine Screen Mirroring Bloatware Loyalty Books 2FA Fiber Optics Frequently Asked Questions Multi-Factor Security Employee Monitor Cabling Windows 10s Tablets Search Engine Twitter Messaging Mobile NIST Policy Business Mangement Hypervisor Cast Entrepreneur Streaming Media Emergency Dark mode Smart Tech Trend Micro Tip of the week Trending Reputation webinar Amazon Default App Public Cloud Tech Support Employer Employee Relationship Addiction SMS Content Professional Services Shortcut Printer Server

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code