Microsoft’s latest security vulnerability could have a lingering impact both on consumers and businesses at a time when many around the world are already on high alert for disruptive cyber attacks.

Researchers at security firm Sangfor recently found a Windows vulnerability, called PrintNightmare, that could allow hackers to remotely gain access to the operating system and install programs, view and delete data or even create new user accounts with full user rights. The firm accidentally leaked instructions on how the flaw could be exploited by hackers, exacerbating the need for Windows users to update their systems immediately.

Here’s what you should know about the issue and how to address it:
Microsoft is urging all Windows users to install an update that affects the Windows Print Spooler service, which allows multiple users to access a printer. The company has already rolled out fixes for Windows 10, Windows 8, Windows 7 and some server versions. Microsoft ended support for Windows 7 last year, so the decision to push an update to that software highlights the severity of the PrintNightmare flaw.

Although many Windows users don’t have remote access capabilities on their home computers, business computers or people working remotely and connecting back to the office could be most affected.

How big a deal is this?
Windows 10 runs on about 1.3 billion devices worldwide so the magnitude of the vulnerability’s potential reach is massive.

Because Windows 10 is used by desktop computers as well as some servers, it could potentially enable hackers to infiltrate a network “very quickly” and get in “practically anywhere to find the most lucrative databases and systems to attack.

How to download the patch
Windows users can visit the Settings page, then select the Update & Security option, followed by Windows Update, or just visit the Microsoft website to download the new software update directly.

The big takeaway
This incident serves as a reminder for both businesses and consumers to routinely update any installed software to ensure impacted systems aren’t left exposed.

For more information on this zero-day exploit ypu can visit this website:
https://nakedsecurity.sophos.com/2021/06/30/printnightmare-the-zero-day-hole-in-windows-heres-what-to-do/

Deliver David's Tech Talk to my inbox

We'll send David's weekly Tech Talk to your inbox - including the MP3 of the actual radio spot. You'll never miss a valuable tip again!