close
close

When you activate Windows, you are assured that you are making sure that you are protected

When you activate Windows, you are assured that you are making sure that you are protected

If you activate Windows, it is worth increasing the security of your locks

Patch service is back: Microsoft is publishing a major security update on the second service of the months, the possessions for all swamps accepts, which the companies will have the previous month covered. If it is even more important, the PC with the new security updates on the new state of affairs, this Patch service is more important.

Microsoft hat 90 Safety Lücken with diesem letzten Update history. 10 days after Zero-Day-Lücken, also Schwachstellen, which covers worth it, before the Entwickler has the Möglichkeit, he will behave. When the 10th time they were active in the wilderness, it was intended that there was a small voluntary company that had consumed these schwachstellen, a verlenzliche system-supplement. It is now a fragment of the time that it is rediscovered, while the others have four ausnutzen-können.

From the 10th Zero-Day-Lücken, the update is identified. The delayed Schwachstellen are one of the best markers:

  • CVE-2024-38106: Windows Kernel Erhöhung von Berechtigungen Schwachstelle
  • CVE-2024-38107: Windows Power Dependency Coordinator Erhöhung von Berechtigungen Schwachstelle
  • CVE-2024-38189: Microsoft Project Ferncodeausführung Schwachstelle
  • CVE-2024-38193: Windows Ancillary Function Driver for WinSock Erhung by Berechtigungen Schwachstelle
  • CVE-2024-38213: Windows Mark of the Web Sicherheitsmerkmalsumgehung Schwachstelle
  • CVE-2024-38178: Skriptmotor Speicherfehler Schwachstelle
  • CVE-2024-38200: Microsoft Office Spoofing Schachstelle
  • CVE-2024-38199: Windows Line Printer Daemon (LPD) Service Ferncodeausführung Schwachstelle
  • CVE-2024-21302: Windows Secure Kernel Mode Erhöhung von Berechtigungen Schwachstelle
  • CVE-2024-38202: Windows Update Stack Erhöhung van Berechtigungen Schwachstelle

Hacker can adjust to the history of art, je nach Art der Sicherheitslücke, which has disappeared. Laut The Hacker News Possibly the active exploited Schwachstelle CVE-2024-38213 volunteer actors, Microsoft Defender’s SmartScreen with you, is protected against Malware and Phishing scheme. A soul must now receive a shady date, which a volunteer Actor agent sends by email. Perhaps your “boss” must bring it to you, to open this important Excel data. If you die, you can write out the script, the hereditary sin, one of those Schwachstelle options.

Aber auch Schwachstellen, who have no Zero-Days, pose Risks by: Jetzt, from Microsoft 80 other Security Lücken dokumentiert hat, which were required in this Update, can be willingly Akteure möglicherweise found out, who they are, and can have PCs, which nor is it active. If you install the updates, it is certainly the case that these changes will be made to my work, while you will no longer be able to make money if you expand your exploits – so less for these bekannnts of Security Lücken.

This update is available for Windows 10 as well as Windows 11. Your PC is not installed on Microsoft’s new operating systemPlease make sure to perform the Security Update as soon as possible.

Therefore, install the Windows Security Update

If the PC performs an update automatically, it can happen that it performs itself. Here you can find, if you install manually or perform a maintenance, the installation work:

If you are using Windows 11, this is the case Start > Installation > Windows Updates. If you are using Windows 10, this is the case Start > Installation > Update & Security > Windows Update > Nach Updates. Once the update is updated, you can reload and install it.

This Patch Service Release from Microsoft in August is big and attention 90 Security Holes. Since 10 Zero Days more activities in the Tech World are possible than ever.

The active application of CVE-2024-38213 was lightly exploited by Hackern, Microsoft Defender’s SmartScreen, was for Windows users under the greatest power, allowing the security update to be installed as soon as possible.

Also read: