How Hackers Can Exploit Windows 10


hacking exploit

For those of us that are not computer programming experts, the idea of hacking is very mysterious and difficult to comprehend. The general idea is simple enough, but the logistics are esoteric. That’s why it’s a good idea to look at specific examples to get a better idea of how it works.

One example is a recent development, where Microsoft’s Windows 10 was found to have some kernel bug vulnerability. Adobe also was discovered to have a zero-day exploit in its Adobe Flash product. And with these types of vulnerabilities, you always have these opportunistic types that are always at the ready to pounce when they smell blood. And that’s what has happened with this new Windows 10 and Adobe Flash vulnerability. Apparently, there is a hacker group with ties to the Russian government that has been exploiting these vulnerabilities and bugs. This group has also been up to no good against the likes of Hilary Clinton’s associates, the DNC, and Colin Powell.

Microsoft has also acknowleged this vulnerability and has warned hacker groups like this are sending spear-phishing emails to trick recipients into clicking on malicious links and attachments, which install malware on their machines. This vulnerability in Windows 10 is known as a local privilege escalation bug in the system kernel, which can be exploited by malware to gain admin access on Windows machines. This malware allows the invader to circumvent security on the machine to compromise the system with malicious code.

Microsoft has announced it will take about a week to patch this security vulnerability. Adobe, on the otherhand, has already fixed their vulnerability at the end of October. Microsoft has advised Windows users to update Google Chrome and Adobe Flash or remove them completely until Microsoft can deliver the patch. They have also advised users to be careful of what they download, especially email links.

This example goes to show, that with all the benefits of this new cyberspace era, there are also new dangers that were unimaginable just a short time ago. As this world evolves into a more online-dependent society, these types of threats and dangers will also evolve at an escalating pace. So the most important thing to emphasize is maintaining vigilance and always undertaking the most stringent security procedures.

Cyber Threats

mightyohm via / CC BY-SA

mightyohm via / CC BY-SA

As online business becomes more prevalent in this globalized economy and interconnected world, one main concern for businesses and government entities is cyber security. One of the main concerns concerning cyber security is hackers breaking into websites and online properties without authorization and stealing valuable information that can cause serious harm to individuals and even nations.

One common hacking method is SQL injection. This method involves entering SQL code into web or browser forms to access and manipulate the database behind the site or system, which is typically SQL. SQL works by entering text into a field which then checks the data with a table in the database to see if it matches. If the text matches the table data, then access is granted to the system. Otherwise, access is denied. This type of attack works when system security is not robust and doesn’t protect against simple SQL code that can be used to access the system.

Another common hacking method is the denial of service attack, which causes a system to be rendered inoperable due to the system being slowed down from overloaded resources. This has the objective of crippling a website so that no one can use it.

Another hacking method is cross-site scripting, which threatens a site’s security and can take access information from a user to the website. Cross-site scripting is a security loophole on a website that is hard to detect and stop, which makes the site vulnerable to attacks from hackers. This is especially a high risk because it leaves the site’s users open to identity and financial theft.

Regarding JavaScript, protection for this type of site is generally not very secure. Unless a password is encrypted, these sites are vulnerable to being hacked. Additionally, passwords are generally open to being cracked through brute force attacks.

The first step against cyber attacks is conducting a cyber self-assessment that identifies potential risks and vulnerabilities. Some of these risks can be identified by examining who has access to the system and how sensitive data is transferred, such as through email or messaging systems. The next step is to prepare and plan for these risks and vulnerabilities. This documents the protocol to implement when something goes wrong. The last step is to have procedures that actively monitor these cyber risks. One of the best defenses against these risks is vigilance and extreme effort.

One way to protect against cyber threats is through encryption. This makes it difficult for hackers to steal data. Also within your system, you can name your system files random names so it is harder for intruders to identify what they are. Another way to protect your site is to constantly test for vulnerabilities and think like a hacker to anticipate how they can attack your system. This will allow you to develop countermeasures against these threats. Most importantly, vigilance is crucial, even for simple tasks such as regularly changing passwords and keeping them secure and unpredictable. It is important to constantly update your site and programs within the site to keep it secure against evolving threats.