Microsoft has today released a fix for a serious flaw in the Windows operating system where hackers can exploit the Windows Print Spooler – with the bug being named ‘PrintNightmare’.
This blog post will outline all you need to know – including what the bug is, how it could affect you, and how to update.
What is the bug?
This bug was found by researchers at a cybersecurity company Sangfor. It allows multiple users to access a printer.
What consequences could the bug have?
Microsoft has warned that hackers could install programs, view and delete data and even create new user accounts that have full admin rights.
These privileges that hackers would gain through these methods would mean they would have full access to your PC.
What versions of the operating system are affected?
This security flaw affects operating systems even as far back as Windows 7 and includes the very latest version Windows 10, so it is important to ensure that you remain important.
Updates for Windows Server 2016, Windows 10 version 1607, and Windows Server 2012 will be coming soon according to Microsoft.
How to update
You can download a security update from Windows Update – this update is cumulative meaning that if you install this update, previous updates will also be installed!
“We recommend that you install these updates immediately,” Microsoft has said.
Find out more
You can read more about this new vulnerability on CNN here.
In need for some web-design, ecommerce and SEO?
If you happen to come across this blog post and are in need of some web design, ecommerce, and SEO solutions, we could be perfect for you!
Based in Swindon, Wiltshire, O’Brien Media have over 15 years of experience developing websites for very happy customers! We are also BigCommerce Agency Partners, so we can achieve your digital dreams!
We also make sure our websites are tested for accessibility and ensure that our websites can be used by everyone!
We are Disability Confident Committed and encourage other businesses to be too! July is Disability Pride Month, and you can read more about this and the scheme in our recent blog post here.