{"id":174927,"date":"2023-01-02T10:39:19","date_gmt":"2023-01-02T10:39:19","guid":{"rendered":"https:\/\/harchi90.com\/stop-from-being-hacked-by-getting-this-critical-windows-update-now\/"},"modified":"2023-01-02T10:39:19","modified_gmt":"2023-01-02T10:39:19","slug":"stop-from-being-hacked-by-getting-this-critical-windows-update-now","status":"publish","type":"post","link":"https:\/\/harchi90.com\/stop-from-being-hacked-by-getting-this-critical-windows-update-now\/","title":{"rendered":"Stop from being hacked by getting this critical Windows update now"},"content":{"rendered":"
\n

If you are running Windows on your devices, this story is critically important to you. You see, recently, a significant security breach rocked Microsoft. Luckily its tech experts were able to fix it – and you can avoid the trouble they found by following this story.<\/p>\n

However, this is an important reminder for all of us to always have our devices as up-to-date as possible and to be on the lookout for potential scammers trying to obtain our private information.<\/p>\n

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER<\/strong><\/p>\n

\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n
\n

Hackers figured out a way to bypass a security feature on Windows devices by using standalone JavaScript files to exploit what is known as CVE-2022-44698 zero-day, or SmartScreen.
\n (Kurt Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n

What was the security issue with Microsoft<\/h2>\n

Hackers figured out a way to bypass a security feature on Windows devices by using standalone JavaScript files to exploit what is known as CVE-2022-44698 zero-day, or SmartScreen. By exploiting this, the hackers were able to override SmartScreen, a warning popup designed to appear when suspicious activity is being downloaded onto a Windows device.<\/p>\n

HAVE A SPY ON YOUR PHONE? TAKE STEPS NOW!<\/strong><\/p>\n

Once this was done, hackers could trick Windows users into downloading malicious content onto their devices because there was no warning to stop them from doing so.<\/p>\n

\n
\"With<\/source><\/source><\/source><\/source><\/picture><\/div>\n
\n

With their latest update, Microsoft was able to fix the issue during their December 2022 Patch Tuesday, a day held monthly when the company releases patches for their software issues.
\n (Kurt Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n

How did the hackers manage to exploit the security feature<\/h2>\n

Experts at Microsoft closely examined the issue and discovered that there are only 3 possible ways for the security feature to have been exploited:<\/p>\n