{"id":123758,"date":"2021-06-13T03:23:03","date_gmt":"2021-06-13T10:23:03","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/06\/microsoft-confirms-serious-windows-10-update-warning"},"modified":"2021-06-13T03:23:03","modified_gmt":"2021-06-13T10:23:03","slug":"microsoft-confirms-serious-windows-10-update-warning","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/06\/microsoft-confirms-serious-windows-10-update-warning","title":{"rendered":"Microsoft Confirms Serious Windows 10 Update Warning"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/microsoft-confirms-serious-windows-10-update-warning.jpg\"><\/a><\/p>\n<p>\u201cThis can be hugely damaging in the event of ransomware attacks, where high privileges can enable the attackers to stop or destroy backups and other security tools,\u201d Breen explained. \u201cThe \u2018exploit detected\u2019 tag means attackers are actively using them, so for me, it\u2019s the most important piece of information we need to prioritize the patches.\u201d<\/p>\n<p>If you need any further incentive to update, these seven zero day exploits are part of 50 security vulnerabilities (including another five labelled \u2018Critical\u2019) which June\u2019s Patch Tuesday will address. Google has also issued a <a href=\"http:\/\/www.forbes.com\/sites\/gordonkelly\/2021\/06\/12\/google-chrome-browser-security-problem-chrome-91-upgrade-chrome-users\/\" target=\"_self\" class=\"\" title=\"http:\/\/www.forbes.com\/sites\/gordonkelly\/2021\/06\/12\/google-chrome-browser-security-problem-chrome-91-upgrade-chrome-users\/\" aria-label=\"similar warning for Chrome users\">similar warning for Chrome users<\/a>.<\/p>\n<p>If you are blocking Windows 10 system updates (a popular pastime for many users), now would be a very good time to stop doing so. Go to <em>Start Settings Update &amp; Security<\/em> and in the Windows Update Window look to see if the update has already been downloaded. If not, click <em>Check for Updates<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cThis can be hugely damaging in the event of ransomware attacks, where high privileges can enable the attackers to stop or destroy backups and other security tools,\u201d Breen explained. \u201cThe \u2018exploit detected\u2019 tag means attackers are actively using them, so for me, it\u2019s the most important piece of information we need to prioritize the patches.\u201d [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-123758","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/123758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=123758"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/123758\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=123758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=123758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=123758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}