11-Aug-2016   |     |   0

Alert: Microsoft Fixes 27 Vulnerabilities in Latest Round of Patches

If you have already applied the latest security patches, then you have nothing to worry about. Read on only to discover what kind of threats your quick thinking prevented. If, however, you have yet to apply the security patches, then you’ll want to pay attention to how your network is at risk.

Concerning the vulnerabilities with Microsoft Office, Internet Explorer, and Edge, they are critical in nature and could be exploited remotely through web pages or Office documents, allowing hackers to execute malicious code. Read more about these patches on Microsoft’s security bulletin:

Patch for Microsoft Office: MS16-099
Patch for Internet Explorer: MS16-095
Patch for Edge: MS16-096

More critical vulnerabilities have been found affecting Windows, Microsoft Office, Skype, and Lync. These vulnerabilities have to do with the Windows Graphics Component, which allows hackers to execute remote code through malicious web pages and documents.

Patch for Windows, Microsoft Office, Skype, and Lync: MS16-097

Another security bulletin from Microsoft has to do with a critical remote code execution flaw in Windows PDF Library, which happens to be bundled with Windows 8.1, Windows RT 8.1, Windows 10, Windows Server 2012, and Windows Server 2012 R2. Also, the vulnerability affects Edge in a unique way, allowing attackers to exploit a malicious PDF document hosted on a website, and then trick users into loading the file via their Edge browser.

Patch for Windows PDF Library: MS16-102

Other patches have been flagged by Microsoft as “important” instead of “critical,” but this doesn’t mean they should be ignored.

MS16-101
MS16-100
MS16-098

Have you updated your system with these latest security patches? If you haven’t and you would like assistance getting your company’s network up-to-date and protected, call COMPANYNAME at PHONENUMBER.

For organizations having their network managed by COMPANYNAME, there is no need for alarm. The security patches have already been applied. This is the case with all relevant patches released by Microsoft, both now and in the future. Isn’t it nice to have one less thing to worry about?


Comments (0)

Bitnami