<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title> – security</title>
    <subtitle>Posts tagged security</subtitle>

    <link href="https://thinkmcs.com/news/tags/security/feed.xml" rel="self"/>
    <link href="https://thinkmcs.com/news/tags/security/"/>

    <updated>2024-07-16T00:00:00Z</updated>

    <id>https://thinkmcs.com/news/tags/security/</id>

    
    <entry>
        <title>Microsoft’s Local Wi-Fi Vulnerability in Windows</title>

        <link href="https://thinkmcs.com/news/microsofts-wi-fi-vulnerability/"/>

        <updated>2024-07-16T00:00:00Z</updated>

        <id>https://thinkmcs.com/news/microsofts-wi-fi-vulnerability/</id>

        <content type="html">
            &lt;p&gt;A severe vulnerability was discovered in the Windows Wi‑Fi driver that
could potentially allow an attacker to execute arbitrary code on a
target system. This article summarizes the risk and how to mitigate it.&lt;/p&gt;
&lt;h2&gt;Understanding the Vulnerability&lt;/h2&gt;
&lt;p&gt;This affects all versions of Windows. What makes it particularly
dangerous is that an attacker doesn’t need physical access, only
proximity and access to the same Wi‑Fi network.&lt;/p&gt;
&lt;h2&gt;Exploitation of the Vulnerability&lt;/h2&gt;
&lt;p&gt;An attacker may be able to exploit the flaw without authentication and
without user interaction, which increases the potential impact in public
Wi‑Fi scenarios.&lt;/p&gt;
&lt;h2&gt;Mitigation and Protection&lt;/h2&gt;
&lt;p&gt;Microsoft has released a patch to fix the vulnerability. Users should
update Windows as soon as possible. Avoid untrusted networks where
possible and follow safe Wi‑Fi practices.&lt;/p&gt;

        </content>

    </entry>
    

</feed>