How to protect yourself from the new security bug Windows 10 and 11

by -
photo : sdx15 (Shutterstock) – A serious bug is being investigated by Microsoft that can make hackers take over your PC.

In the latest versions of Windows, a new security vulnerability was detected that hackers could remotely install software, steal data and passwords, or even lock users out of their PCs. Microsoft reports that Windows 1809 is all-newer versions of Windows 10, including beta for Windows 11.

The vulnerability is “overly permissive Access Control Lists (ACLs) on several system files, including the Security Accounts Manager (SAM) database,” according to Microsoft’s bug report. The bug was not successfully used, but the report warns Microsoft that an attack like this is “probable” because of the severity of the vulnerability.

To execute an attack, the attacker would have to have direct access to the computer of a person — either physically or through malware file downloads. When a hacker has access, it can “install programs, view, change or delete data,” or create new accounts with full user rights.”

In future security updates for Windows 10 and 11, Microsoft will ostensibly patch the issue, but users should be vigilant to that. Practices common sense of data security, such as the use of reliable anti-malware programs, and does not use unknown email links or download files from sketchy Websites.

There is also a temporary workaround restricting access to your PC’s vulnerable system files. This will keep hackers away but make it more difficult to retrieve files using the system restoration feature, so it won’t function as a long-term solution. However, whether you want to protect yourself completely from possible safety violations is worth considering.

First, you must restrict access to the system folder “% windir% \system32\config.”

  1. Use the “PowerShell” task bar to search. (Note: These steps in Command Prompt can also be carried out).
  2. Right click on “Run as an administrator” from the results and “Windows PowerShell.”
  3. Type the command in PowerShell: icacls %windir%\system32\config\*.* /inheritance:e.
  4. Press Enter.

Next, delete the restore points of your system. Make sure that you limit the access to %windir%\system32\config.

  1. Right-click on “My PC” and choose “Properties” from Windows File Explorer.
  2. In the left-hand menu, click on “System Protection.”
  3. In the “Available Drives” list, click “Configure,” to highlight your local harddisk.
  4. To confirm, click “Delete,” then click “Continue.”

If you wish to create a system restore point after the old backups have been deleted: Go back to the Protection System tab and emphasize your drive. Click “Create.” Click on “OK” to include a restoration point description (such as date and time).