Featured Articles

HP Stream is a Chromebook killer priced at $200

HP Stream is a Chromebook killer priced at $200

We have been hearing reports of a new breed of affordable Windows notebooks for months. It is alleged that a number…

More...
AMD Radeon R7 SSD line-up goes official

AMD Radeon R7 SSD line-up goes official

AMD has officially launched its first ever SSDs and all three are part of AMD’s AMD Radeon R7 SSD series.

More...
KitKat has more than a fifth of Android users

KitKat has more than a fifth of Android users

Android 4.4 is now running on more than a fifth of Android devices, according to Google’s latest figures.

More...
Aerocool Dead Silence reviewed

Aerocool Dead Silence reviewed

Aerocool is well known for its gamer cases with aggressive styling. However, the Dead Silence chassis offers consumers a new choice,…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Thursday, 19 June 2014 12:18

Microsoft anti-malware can be switched off

Written by Nick Farrell

It might have already been done on your machine

The Microsoft Malware Protection Engine that is integrated into several Microsoft anti-malware products, including Microsoft Security Essentials, was updated on to address a vulnerability that could enable a denial-of-service(DoS).

A vulnerability allows attackers to disable Microsoft’s antimalware products by sending specifically crafted files to users via websites, email, or instant messaging applications.

The vulnerability is located in the Microsoft Malware Protection Engine, which sits at the core of many Microsoft security products for desktops and servers including Microsoft Forefront Client Security, Microsoft System Center 2012 Endpoint Protection, the Microsoft Malicious Software Removal Tool, Microsoft Security Essentials, Windows Intune Endpoint Protection and Windows Defender, which comes pre-installed in Windows Vista and later.

Redmond has said that vulnerability to be “important,” meaning it could be exploited to compromise user data or processing resources, but not without user action.

If the attacker is successful the vulnerability will result in Microsoft Malware Protection Engine not properly monitoring affected systems.

It is not that easy to do and there is no evidence that the hole has been exploited yet.

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments