The Redmond giant preferred to deploy the patch as soon as possible and not wait until April Patch Tuesday in order to nip remote code execution attempts in the bud. As Microsoft explains, the root-cause for this vulnerability is an incomplete Malware Protection Engine scan that fails to detect the threat. This security vulnerability was initially discovered by the Google Project Zero team. The latest Windows Defender update fixes this vulnerability by correcting the way in which Windows 10’s Malware Protection Engine scans specially crafted files. There are many way attackers could take control over your machine. As Microsoft explains, hackers could push specially crafted files to your computer when your access a website. At the same time, attackers could send malware-infected files via email or instant messaging apps. Websites that host user-provided content are the perfect vehicle for spreading malicious software that take advantage of this Windows Defender vulnerability. End users don’t need to take any action to install the update as the automatic detection and update deployment will apply it within 48 hours of release. For more information, check out Microsoft’s Security TechCenter. RELATED STORIES TO CHECK OUT:

Windows Defender blocks all threats in real-world AV-Comparatives tests Fix: Unable to activate Windows Defender Firewall in Windows 10 Fix: Windows Defender won’t turn on in Windows 10

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ