SlideShare une entreprise Scribd logo
1  sur  5
Does Microsoft
Show Hackers How
       To Attack?



  SafeSpaceOnline



      LOGO
 After another security hole recently surfaced in
  Microsoft's Windows operating system, the software
  giant released a patch this past Friday to plug the
  possibly devastating "back door" which allows hackers to
  potentially seize control of any pc running Windows.
 The latest threat, "Download.Ject," infiltrates computers
  after users surfing with Microsoft's "Internet Explorer"
  web browser visit websites infected with the virus.
 This newest security patch covers Windows XP, 2000,
  and Windows Server 2003.




                                                      SafeSpaceOnline
 Several factors make this latest development more disturbing than
  past discoveries of security problems with Internet Explorer, currently
  the most dominant web browser on the market.
 First, it demonstrates very clearly that criminals discovered they can
  use the power of viruses to very profitably steal important bank,
  personal, and credit data from people on a large scale.
 Second, it took Microsoft what many would consider a very long time
  to come up with a patch for this problem.
 Before a fix appeared, Microsoft told everyone who uses Internet
  Explorer to stick their finger in the dyke by putting their web browser
  security settings on high, rendering it impossible to view or use
  features on many websites and web-based services.
 Third, expect this to happen again as new holes open in the future
  when Microsoft makes Windows more complicated, adds layers of
  code, and generally makes the operating system more complex.
 This may sound like business as usual, however, I think this story
  actually points to a much deeper problem, one for which I'm not sure
  a simple solution exists.
 Though free and reasonably reliable, many people do not
  automatically update their Windows operating system through the
  update service on Microsoft's website. (I won't even get into how
  many people don't operate up-to-date anti-virus protection.) SafeSpaceOnline
   Whenever Microsoft publishes a security update, especially for a highly publicized and
    obviously widespread security breach, thousands of people will not immediately download the
    update.
   In fact, tens-of-thousands of users will not download these security updates for days, weeks,
    even months (if ever).
   So let me ask what seems like a very elementary question: By publishing security updates
    that point out very obvious flaws in their system, doesn't Microsoft also point the way to
    exactly where the holes exist?
   Let me put it another way.
   Doesn't this rate the same as discovering that the local bank vault won't lock and then
    announcing the details on the front page of the paper along with the dates and times no bank
    guard will be on duty?
   After all, if tens-of-thousands of users won't immediately get the Microsoft Security Patch,
    don't those patches show hackers exactly which holes get plugged (and which, logically, must
    already be open without the patch)?
   It doesn't take a hacker with more than a basic set of skills to recognize where and what holes
    got fixed and then reverse-engineer how they can get into computers that don't get updated.
   Now, do I have a concrete, 100% bullet-proof answer to this problem? Unfortunately, I don't
    have more than a common- sense answer...
   At this point, your best defense rates staying current on the latest threats and how to defend
    against them.
   Keep your anti-virus software current, your firewall up, and your Windows software updated
    with the latest security patches.
   Though not a perfect solution, at least you'll have a fighting chance to prevent, or at least
    minimize, any possible threats.
   For more information from Microsoft's website, go here http://www.ebookfire.com/download-
    ject.html
                                                                                           SafeSpaceOnline
Read more at SafeSpaceOnline.com




             LOGO

Contenu connexe

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

En vedette

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Does microsoft show hackers how to attack

  • 1. Does Microsoft Show Hackers How To Attack? SafeSpaceOnline LOGO
  • 2.  After another security hole recently surfaced in Microsoft's Windows operating system, the software giant released a patch this past Friday to plug the possibly devastating "back door" which allows hackers to potentially seize control of any pc running Windows.  The latest threat, "Download.Ject," infiltrates computers after users surfing with Microsoft's "Internet Explorer" web browser visit websites infected with the virus.  This newest security patch covers Windows XP, 2000, and Windows Server 2003. SafeSpaceOnline
  • 3.  Several factors make this latest development more disturbing than past discoveries of security problems with Internet Explorer, currently the most dominant web browser on the market.  First, it demonstrates very clearly that criminals discovered they can use the power of viruses to very profitably steal important bank, personal, and credit data from people on a large scale.  Second, it took Microsoft what many would consider a very long time to come up with a patch for this problem.  Before a fix appeared, Microsoft told everyone who uses Internet Explorer to stick their finger in the dyke by putting their web browser security settings on high, rendering it impossible to view or use features on many websites and web-based services.  Third, expect this to happen again as new holes open in the future when Microsoft makes Windows more complicated, adds layers of code, and generally makes the operating system more complex.  This may sound like business as usual, however, I think this story actually points to a much deeper problem, one for which I'm not sure a simple solution exists.  Though free and reasonably reliable, many people do not automatically update their Windows operating system through the update service on Microsoft's website. (I won't even get into how many people don't operate up-to-date anti-virus protection.) SafeSpaceOnline
  • 4. Whenever Microsoft publishes a security update, especially for a highly publicized and obviously widespread security breach, thousands of people will not immediately download the update.  In fact, tens-of-thousands of users will not download these security updates for days, weeks, even months (if ever).  So let me ask what seems like a very elementary question: By publishing security updates that point out very obvious flaws in their system, doesn't Microsoft also point the way to exactly where the holes exist?  Let me put it another way.  Doesn't this rate the same as discovering that the local bank vault won't lock and then announcing the details on the front page of the paper along with the dates and times no bank guard will be on duty?  After all, if tens-of-thousands of users won't immediately get the Microsoft Security Patch, don't those patches show hackers exactly which holes get plugged (and which, logically, must already be open without the patch)?  It doesn't take a hacker with more than a basic set of skills to recognize where and what holes got fixed and then reverse-engineer how they can get into computers that don't get updated.  Now, do I have a concrete, 100% bullet-proof answer to this problem? Unfortunately, I don't have more than a common- sense answer...  At this point, your best defense rates staying current on the latest threats and how to defend against them.  Keep your anti-virus software current, your firewall up, and your Windows software updated with the latest security patches.  Though not a perfect solution, at least you'll have a fighting chance to prevent, or at least minimize, any possible threats.  For more information from Microsoft's website, go here http://www.ebookfire.com/download- ject.html SafeSpaceOnline
  • 5. Read more at SafeSpaceOnline.com LOGO