Skip to main content

Microsoft updates protect Windows against state-sponsored attacks

researchers use ambient light sensor data to steal browser exhausted man computer problems desk hacking hackers malware frust
Shutterstock
The WannaCry ransomware attack that eventually infected more than 200,000 machines worldwide and caused numerous organizations some real headaches demonstrated just how vulnerable our systems can be. It also showed just how important it is to keep our systems updated because fully patched Windows 7, 8.1, and 10 systems were not affected by the attack.

Now, Microsoft is taking some steps to help protect Windows against cyberattacks perpetrated by government organizations. Known as nation-state actors, these groups can be some of the most competent in breaking into systems and stealing sensitive data.

Microsoft’s first steps in addressing these concerns are to issue a number of additional security updates to go along with its usual Update Tuesday release. All versions of Windows, including older versions, will receive these updates, a step that Microsoft is taking due to “the elevated risk for destructive cyber attacks” that exists today. As Microsoft describes the new updates:

“Today, as part of our regular Update Tuesday schedule, we have taken action to provide additional critical security updates to address vulnerabilities that are at heightened risk of exploitation due to past nation-state activity and disclosures. Some of the releases today are new, and some are for older platforms under custom support agreements, that we are making publicly available today. Customers with automatic updates enabled are protected and there is no additional action required. For customers managing updates, or those on older platforms, we encourage them to apply these updates as soon as possible.”

In order to receive these updates, you need to make sure your Windows machines are configured for automatic updates. At least, head over to Windows Update on all of your machines and run the update process periodically if you don’t have automatic updating turned on.

Microsoft has provided additional details on these updates at its Security Response Center blog. It also provides more information on how to determine which version of Windows you are running and additional details on how to enable Windows Update. As usual, the company recommends that anyone running a very old version such as Windows XP update to Windows 10, which will bring a host of additional security advantages in addition to the most up-to-date features.

Editors' Recommendations

Mark Coppock
Mark has been a geek since MS-DOS gave way to Windows and the PalmPilot was a thing. He’s translated his love for…
After 10 years of headaches, I’m finally a believer in Windows on ARM
The Microsoft Surface 3 with its blue keyboard.

Almost two years in, Apple is on the verge of completing its transition to ARM. It might surprise you to know, then, that Microsoft started its own journey to ARM chips long before Apple.

But Windows' support for ARM has been far less smooth. There aren't many more Windows devices with ARM chips than there were five years ago -- and I can attest to having personally used every failed attempt along the way.

Read more
The latest Windows update is causing major printer problems
A Dell laptop with Windows 10 sitting on a desk.

Microsoft is now offering Windows 10 users a workaround for an issue that has come along with a mid-July update.

The KB5015807 update, which rolled out on July 12 and includes OS Builds 19042.1826, 19043.1826, and 19044.1826 all have a glitch that affects printers connected to computers running Windows 10. After the update is installed, you might see multiple printer listings available when you only have one product.

Read more
Update Windows now to patch this critical Microsoft Word exploit
Person sitting and using an HP computer with Windows 11.

Microsoft has rolled out security updates as part of its June 2022 Windows updates to address a serious security bug that has targeted programs including Microsoft Word.

The Windows zero-day vulnerability is known as Follina (CVE-2022-30190) by security researchers and is "actively exploited in ongoing attacks," according to Bleeping Computer.

Read more