Skip to main content

Is Windows 8 Really Secure? Analysis of Security Flaws and Vulnerabilities of the Latest Product From Microsoft

security icon representing windows 8
If you are using the Internet Explorer, Office Excel, True Type Fonts, IIS, or the now out-of-date Windows Briefcase, your computer may be subjected to security attacks.

No sooner has Microsoft released its Windows 8 and RT versions than the security flaws of this OS were revealed. At the beginning of this month, Microsoft’s Security TechCenter revealed the possible security flaws on Windows 8 and has released necessary patches. Here is what you need to do to immediately secure your Windows computer.

If you wish to get notifications on any of the latest Windows security issues, subscribe to this newsletter.

Most of these issues cause ‘remote code execution’ that helps an attacker, such as a hacker or a virus, work on your system like it belongs to him. On computers, the attack by a virus occurs when you start a program, and this program is an executable file (one with the file extension .exe or .dll in some other cases).

When a program is executing on your computer, it has a lot of privileges—disk access to read data stored on the computer, memory operations, processor access, etc. If the executable file is a virus, it could access the disk to steal information, operate on the memory to crash other programs, or act on the processor to crash Windows 8 itself.

When you try to recover from such a crash, you may find out that the virus has replicated all over your system causing havoc. Here, I have a list of applications that could cause security loopholes on your computer.

1. Internet Explorer Vulnerability


Three reports have surfaced since the release of Windows 8 on vulnerabilities of Internet Explorer. This affects Internet Explorer version 9 on various versions of Windows. The loophole gives a hacker permission to access your system and work on it with the same privileges as you have. If you are the administrator, the hacker can become the administrator on your computer if you get attacked.

Microsoft has released a security patch to cover this vulnerability here.

2. Briefcases in Windows


Microsoft Briefcase syncing application
If you are still using this functionality of Microsoft Windows, be careful. The current vulnerability found in Briefcases could open security loopholes.

So what is Briefcase in Microsoft terminology? Simply right-click in a folder and select the ‘New’ option and you will see ‘Briefcase’ as one of the things that you can create. It is a file synchronization tool (just like the Dropbox app you install in your computer for remote synchronization with your cloud storage provider). The Briefcase is equipped to provide 2-way synching with another folder that you choose (mostly belonging to the mobile PC).

In order to secure your briefcase, do not open it or work with it before applying this Microsoft Briefcase patch. The vulnerability is not applicable to Windows RT though.

3. .NET Framework


.NET Framework is a technology that forms the basis of Windows application development. That means, in order to run a lot of Windows applications, you have to have .NET Framework installed. They include high productivity apps, certain games, etc.

You may not know if you have it installed, but there is a way to find out. Simply go to Control Panel->Programs and Features. You will get a list of applications installed on the computer, and among them you can find .NET Framework if installed.

In order to secure this application, download the patch here.

4. Issues With Documents and Fonts


Do you know that you can embed executable code on a document such as a Word document or and Excel Spreadsheet? Such code snippets could create interactivity on your document as well as prove drastic if the code is malicious. This could simply make way for remote code execution.

If you are unsure of the documents you are downloading from the web, do not download them. Also, certain websites may embed unusual fonts in your system without your knowledge. This could also pave way to remote code execution, thwarting the security of your Windows computer.

In order to make your documents and fonts secure, install this Microsoft patch.

5. Microsoft Excel


A part of the Office Suite of Microsoft, Excel is a highly acclaimed spreadsheet program. Do you know that even a spreadsheet file you download from an unknown location could inject malicious code that may make your computer insecure?

Four reports have surfaced regarding the security issues of Microsoft Office, specifically Excel. Microsoft has released this patch to secure the application.

6. Internet Information Services


Microsoft’s Internet Information Services (IIS) is a web server, and on most of the client systems, it may not even be turned on. This is an application that websites running Microsoft Windows operating system at the server side use. It is hence most probably dormant on your computer. Still, if you are unsure, you can find out from Control Panel->Add/Remove Programs->Windows components (Win XP) or Programs & Features->Turn on Windows Features (Win 7).

If IIS is turned on in your computer, you should install this patch to fix issues with it.

In order to download the patch go here.

Conclusion


As Microsoft has become mostly secure, people don’t worry much about the operating system. Also, if you have a third party antivirus application, your system should be secure. One other thing you should make sure is browsing secure websites and not downloading unknown data. Most of your computers have Windows Update service turned on and the system will automatically update all necessary Windows 8 security updates. If in case it is not enabled on your computer, you should download these patches.

[Image credit: bios-mods.com, SoftIcons]

Popular posts from this blog

What Is the Role of a Firewall, and How Does It Secure a Network From Unsafe Traffic?

To understand firewalls, basic understanding of how networks function is requisite. Deep down, how do the packets of information that you send reach the intended receivers? How do the messages intended for you reach you safely? And how does it all function like clockwork? Let’s understand the basics of firewalls and see how a firewall secures the traffic in and out of a network. Consider this scenario for getting an understanding of how firewalls work. Say, you open up your browser to book a flight ticket for your upcoming vacation, and your computer is conveniently insecure without a firewall. Let’s say you come across an intriguing email that gives an offer you can’t refuse. You open the email and click a link, and bam! An unwanted piece of spyware is installed on your system. The spyware then proceeds to sit on your system tray, hidden from your eyes, tracking the keystrokes you make, reading the top-secret files you have, and looking for potentially rewarding information, such...

Digital Marketing Done Properly in the New Age

I suppose it’s coincidence that this post appears almost exactly one year after Blue Bugle went sort of inactive. Today, the blog doesn’t enjoy as many readers as it once used to. This unfortunate thing is due to my hectic schedule in my new day job as senior content writer for an organization called MSys. This job gives me more opportunities to explore the separate aspects of the digital marketing domain. In the past, all we used to do was promoting our blog posts through social media at random thereby trying to gather as many visitors as possible. You never studied the prospects, the market, or the social channels you promote your stuff to.  Most of the SEO companies out there prided themselves in creating spammy blog comments to create links to client websites. Needless to say, most of these plans never worked or had less positive impact. Now, if you follow the same spammy activities, you are sure to get a ban at best. I had to come up with a new marketing plan for MSys th...

What Apple Really Needs to Do With iPhone 5S and 5C?

We have news that iPhone 5S and a possible mid-range version, iPhone 5C will be launched by the tenth of this month. There have been numerous rumors of these devices already. It’s Apple, and iPhone’s the most prestigious smartphone ever made; hence, there definitely will be rumors floating around year round. However, we know pretty well how Apple has been losing its market to competitors, Samsung, LG, and others in the last two or three years. In the tablet market, Apple still has its strong hold. iPad 4 and Mini are still at the top of tablet market, but the competition is growing strong as we speak. iPad Mini has not been impressive for us . In such a market, the most important and most prestigious product of Apple, iPhone has to come with some improvements in order to help the company stay on top of the competition. Let’s analyze. iPhone 5S and 5C Here’s what we have in news about these devices. It’s possible that the devices will be released by 10 th of this month. It’s...