The new zero-day vulnerability on Windows 10 helps hackers take control of the computer
Recently, a security researcher called @SandboxEscaper posted on social networking information Twitter a zero-day vulnerability on Windows 10.
This is a serious security vulnerability that could allow hackers to attack and gain control of computer devices. Not long after the announcement of this account has been deleted.
This new zero-day vulnerability is detected in the Task Scheduler software, an application in the Advanced Local Procedure Call (ALPC) interface, which grants permission to allow users to access the system. However, exploiting this vulnerability is complex and if successful, a hacker can easily take control and download malicious code to the victim's computer.
With this serious security hole, Microsoft will soon release a patch in the near future, which may begin on September 11.
See more:
- Millions of Android devices stick with security holes in firmware, hackers can exploit to lock users' machines
- In prison, hackers can still steal more than $ 200,000 through a tablet without an Internet connection
- Serious security flaws on Windows 10 allow anyone to log in by voice
You should read it
- Discover new Zero-Day vulnerabilities that target bugs in Windows 10 Task Scheduler
- IBM developed a new technology to patch security holes
- The Mail app on iOS has serious vulnerabilities
- HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocol
- Find security holes on every site with Nikto
- Immediately fix critical vulnerabilities in Windows NTLM security protocol
- Security vulnerabilities - basic insights
- 5 common errors in managing security vulnerabilities
- How to fix BlueKeep security error for Windows 2003, Windows XP, Windows 7, Windows Server 2008
- How to scan websites for potential security vulnerabilities with Vega on Kali Linux
- Many serious vulnerabilities have been discovered that allow attackers to take full control of the 4G router
- Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
Maybe you are interested
iPhone security tips you're missing out on
This list of common passwords shows how little we understand about online security
Download free Windows Server 2025 security guide
5 Misconceptions About Password Security
Should I buy a USB, Bluetooth or NFC security key?
4 Security Steps to Follow When Using Remote Access Applications