Warning : Your windows is at risk | By just click on the links

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@inbox.ghost·
0.000 HBD
Warning : Your windows is at risk | By just click on the links
<html>
<p><img src="https://preview.ibb.co/mFnABx/now_windows_10_cumulative_update_kb4088787_appears_to_be_failing_to_install_too_520240_2_0_00_00_00.jpg" width="640" height="360"/></p>
<h1>&nbsp;Can you get hacked just by clicking on a link or opening a website ? &nbsp;<strong>YES</strong>&nbsp;</h1>
<p><br></p>
<p>&nbsp;Microsoft has just released its April &nbsp;month's Patch Tuesday security updates, which addresses multiple &nbsp;critical vulnerabilities in its Windows operating systems and other &nbsp;products, five of which could allow an attacker to hack your computer by &nbsp;just tricking you visit a website.<br>
 Microsoft has patched five critical vulnerabilities in Windows Graphics &nbsp;Component that reside due to improper handling of embedded fonts by the &nbsp;Windows font library and affects all versions of Windows operating &nbsp;systems to date, including Windows 10 / 8.1 / RT 8.1 / 7, Windows Server &nbsp;2008 / 2012 / 2016&nbsp;</p>
<p>&nbsp;An attacker can exploit these issues by &nbsp;tricking an unsuspecting user to open a malicious file or a specially &nbsp;crafted website with the malicious font, which if open in a web browser, &nbsp;would hand over control of the affected system to the attacker.<br>
 All these five vulnerabilities in Windows Microsoft Graphics were &nbsp;discovered and responsibly disclosed by Hossein Lotfi, a security &nbsp;researcher at Flexera Software.&nbsp;</p>
<h1>&nbsp;CVE-2018-1010<br>
 CVE-2018-1012<br>
 CVE-2018-1013<br>
 CVE-2018-1015<br>
 CVE-2018-1016&nbsp;</h1>
<p>&nbsp;Windows Microsoft Graphics is also &nbsp;affected by a denial of service vulnerability that could allow an &nbsp;attacker to cause a targeted system to stop responding. This flaw exists &nbsp;in the way Windows handles objects in memory.<br>
 Microsoft has also disclosed details of another critical RCE &nbsp;vulnerability (CVE-2018-1004), which exists in Windows VBScript Engine &nbsp;and affects all versions of Windows.<br>
 "In a web-based attack scenario, an attacker could host a specially &nbsp;crafted website that is designed to exploit the vulnerability through &nbsp;Internet Explorer and then convince a user to view the website," &nbsp;Microsoft explains.</p>
<h3>"An attacker could also embed an ActiveX control marked 'safe for &nbsp;initialization' in an application or Microsoft Office document that &nbsp;hosts the IE rendering engine."</h3>
<p>&nbsp;Besides this, Microsoft has also patched &nbsp;multiple remote code execution vulnerabilities in Microsoft Office and &nbsp;Microsoft Excel, which could allow attackers to take control of the &nbsp;targeted systems.<br>
 The security updates also include patches for six flaws in Adobe Flash Player, three of which were rated critical.<br>
 Rest CVE-listed flaws has been addressed in Windows, Microsoft Office, &nbsp;Internet Explorer, Microsoft Edge, ChakraCore, Malware Protection &nbsp;Engine, Microsoft Visual Studio, and the Microsoft Azure IoT SDK, along &nbsp;with bugs in Adobe Flash Player.<br>
 Users are strongly advised to apply security patches as soon as possible &nbsp;to keep hackers and cybercriminals away from taking control of their &nbsp;computers.<br>
 For installing security updates, simply head on to&nbsp;</p>
<h3>Settings → Update &nbsp;&amp; security → Windows Update → Check for updates, or you can install &nbsp;the updates. &nbsp;</h3>
<p><br></p>
<p><br></p>
</html>
👍 , , , , , ,