Thursday, November 14, 2024
Google search engine
HomeTech NewsSecurity Gap Found in Windows 10

Security Gap Found in Windows 10

In an unprecedented move that is unprecedented, the US National Security Agency (NSA) has publicly revealed that it has found a serious security breach in Microsoft’s Windows 10 operating system, which could be exploited by hackers or other malicious agents.

Windows-10
flickr.com

Normally, one would expect – after the revelations of Edward Snowden – the NSA to silence the “back door” and use it properly for its own benefit.

After all, she has previously been accused of exploiting various “holes” in Microsoft products to “hack” target computers without ever notifying the company. And unfortunately, later some of these “tools” of cyber-espionage fell into the hands of regular hackers.

Microsoft has already rushed to release a “patch” for the problem, and earlier sent the security upgrade to the US military and other “sensitive” users with a rating. The NSA revealed the security breach during a press conference but did not specify how long it had known about it before revealing it to Microsoft. The Service claimed that it had warned companies in the past about similar problems, but in a discreet manner.

The problem, which also affects Windows Server 2016 and 2019, but not older versions of Windows, is present in Windows 10’s crypt32.dll program, which allows developers to access various functions, such as the digital certificates used for certification of software programs. Theoretically, the security gap allows a hacker to camouflage malicious software as legal and reliable.

NSA cybersecurity director Ann Newberger said the secret service had decided to report her involvement in the matter at Microsoft’s request, according to the BBC and Reuters. So far, according to the NSA and Microsoft, there is no evidence that a hacker has taken advantage of the security vacuum (for the NSA itself, no one can ever be sure.).

“The NSA may already have other methods of violating a Windows system, so it simply didn’t need the new security vacuum,” Chris Morales, chief analyst at cybersecurity company Vectra, told the Financial Times.

Source: RES-EIA

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments