Vulnerability found in Windows Defender the worst ever?
10 May 2017
In the most recent notable piece of news concerning data protection a vulnerability was discovered in Microsoft’s malware protection engine by a vulnerability researcher at Google.
Microsoft responded in record time taking 3 days versus an anticipated several weeks to patch what was described as “the worst Windows remote code exec in recent memory”
Are you up to date?
Check if your Windows PC has been updated to the most recent version by going to "Windows Defender settings”.
If the Engine version number is 1.1.13704.0 or higher it means you are up to date.
means you've been patched.
This patch is relevant to Windows 7, 8, 8.1 and 10 and Server 2016.
More on this story here
Update and Scan
If you are running antivirus software It’s no good just updating and not scanning.
Typically anti virus systems scan and block virae as it comes into the pc.
When you update your anti -virus it downloads defences against the latest virus.
It can then recognise and prevent them form executing malware on your pc.
However, you need to do a FULL scan of your machine, not just the 5 minute quick scan to see if the virae are already in your system which the antivirus is now equipped to recognise.
There is an argument now by the browser developers that it is harder to develop secure systems when the installation and nature of antivirus software compromises the integrity.
It has to be a reality that the antivirus software programmes that we invite and download on our machines have got to be the top targets for hackers to install trojan horses.