Disable 92% of Windows vulnerabilities

According to BeyondTrust, it is possible to limit the damage or completely avoid attacks on Windows vulnerabilities without logging in as an administrator.

By studying all of the Windows operating system vulnerabilities discovered in 2008, BeyondTrust, a security firm, said that 92% of those vulnerabilities do not affect users at all or at least be less dangerous. a lot if they do not log in to the computer with administrative rights (administration).

Disable 92% of Windows vulnerabilities Picture 1 John Moyer, the company's CEO, said: ' This is a good suggestion for businesses because it is clear that not logging in with administrative rights will control most attacks '. According to BeyondTrust research, 69% of the total of 154 vulnerabilities that Microsoft patched in 2008 (including serious or non-serious vulnerabilities) will not affect the user's system at all. Attacks aimed at that vulnerability can only be performed by administrative rights.

If only the vulnerabilities of the Internet browser and Microsoft Office text editing software are included, there are 89% of the old holes and 94% of the new vulnerabilities will become harmless to the user before the attacks. when their computer is not logged in with administrative rights. ' We feel quite surprised by such a large percentage, ' said Scott McCarley, the company's marketing director.

In addition, the use of administrative rights on Windows versions is a controversial issue because last week, a group of bloggers posted a code snippet and demonstrated a complete disable attack tactic. Full user account management (UAC) functionality on the operating system is being tested Windows 7 - one of the security features that Microsoft introduced from Windows Vista in 2007.

' That is the most vivid example of how dangerous it is to log on to a computer using administrative rights. Hackers will not be able to do anything even if they have hacked into the system if it is just a 'guest' account , 'Scott McCarley said.

Microsoft then denied it was considered a vulnerability in Windows 7.

4 ★ | 2 Vote

May be interested

  • The Mail app on iOS has serious vulnerabilitiesThe Mail app on iOS has serious vulnerabilities
    security researchers at zecops have discovered two serious vulnerabilities that exist on the default mail application pre-installed on millions of iphones and ipads.
  • Four Windows vulnerabilities can be exploited in the perfect attack chainFour Windows vulnerabilities can be exploited in the perfect attack chain
    the vulnerabilities include: 2 remote code execution errors, 1 privilege escalation error and 1 secure boot security feature bypass error. under ideal conditions, hackers can combine 4 vulnerabilities to form a perfect attack chain.
  • How to disable keyboard shortcuts and hotkeys on Windows 10How to disable keyboard shortcuts and hotkeys on Windows 10
    you are using a windows pc and suddenly press some shortcut by mistake that randomly opens a program or activates a strange feature. even worse, you may have accidentally closed your software programs by accidentally pressing hotkeys.
  • How to disable USB ports on Windows, Mac and LinuxHow to disable USB ports on Windows, Mac and Linux
    now, you know that using a usb storage device on your computer has many potential security risks. if you fear the risk of being infected with malware, such as trojian, keyloggers or ransomware, you should completely disable the usb storage device if the system has a lot of sensitive data.
  • Turn off Windows Defender on Windows 7 and Windows VistaTurn off Windows Defender on Windows 7 and Windows Vista
    in this article, tipsmake.com will show you how to turn off windows defender on windows 7 and windows vista.
  • HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocolHP publishes a series of critical vulnerabilities in the Teradici PCoIP protocol
    hp has warned of serious security vulnerabilities in the teradici pcoip client and agent for windows, linux, and macos. these vulnerabilities affect 15 million endpoints.
  • How to Disable Internet Connection (Windows)How to Disable Internet Connection (Windows)
    this wikihow teaches you how to disable any internet connection on your windows pc. if you're using windows 10 or 8, you can quickly disable all internet access by turning on airplane mode. for a longer-term solution, you can disable your...
  • How to block Specter Variant 2 Patch on Windows 10How to block Specter Variant 2 Patch on Windows 10
    microsoft has released a windows 10 kb4078130 update to disable patches for two meltdown and specter vulnerabilities that caused a reboot problem on some devices. however, if you do not want to waste storage space, users can adjust themselves without having to download additional kb4078130.
  • Disable UAC in Windows 7Disable UAC in Windows 7
    as you know, uac is an available feature in windows that prevents unwanted changes on your computer, helping to protect your computer better. however sometimes the annoyance caused by it causes the user to be annoyed and just want to remove it.
  • How to disable Windows Registry on Windows 10How to disable Windows Registry on Windows 10
    the windows registry is one of the most important tools in windows 10. since it can profoundly change the way your operating system works, allowing every user on your pc to access it isn't a big deal. good opinion.