How Hackers Can Exploit Windows 10


hacking exploit

For those of us that are not computer programming experts, the idea of hacking is very mysterious and difficult to comprehend. The general idea is simple enough, but the logistics are esoteric. That’s why it’s a good idea to look at specific examples to get a better idea of how it works.

One example is a recent development, where Microsoft’s Windows 10 was found to have some kernel bug vulnerability. Adobe also was discovered to have a zero-day exploit in its Adobe Flash product. And with these types of vulnerabilities, you always have these opportunistic types that are always at the ready to pounce when they smell blood. And that’s what has happened with this new Windows 10 and Adobe Flash vulnerability. Apparently, there is a hacker group with ties to the Russian government that has been exploiting these vulnerabilities and bugs. This group has also been up to no good against the likes of Hilary Clinton’s associates, the DNC, and Colin Powell.

Microsoft has also acknowleged this vulnerability and has warned hacker groups like this are sending spear-phishing emails to trick recipients into clicking on malicious links and attachments, which install malware on their machines. This vulnerability in Windows 10 is known as a local privilege escalation bug in the system kernel, which can be exploited by malware to gain admin access on Windows machines. This malware allows the invader to circumvent security on the machine to compromise the system with malicious code.

Microsoft has announced it will take about a week to patch this security vulnerability. Adobe, on the otherhand, has already fixed their vulnerability at the end of October. Microsoft has advised Windows users to update Google Chrome and Adobe Flash or remove them completely until Microsoft can deliver the patch. They have also advised users to be careful of what they download, especially email links.

This example goes to show, that with all the benefits of this new cyberspace era, there are also new dangers that were unimaginable just a short time ago. As this world evolves into a more online-dependent society, these types of threats and dangers will also evolve at an escalating pace. So the most important thing to emphasize is maintaining vigilance and always undertaking the most stringent security procedures.