Author Topic: Windows updates can be intercepted and injected with malware  (Read 682 times)

Offline cocalaur

  • Comodo's Hero
  • *****
  • Posts: 309
  • Happy COMODO user
More info here:

http://www.techworm.net/2015/08/windows-updates-can-be-intercepted-and-injected-with-malware.html

I hope COMODO can face the potential threats through its Default Deny Protection scheme and protect
corporations using its certificate services :)
« Last Edit: August 09, 2015, 12:23:17 PM by cocalaur »
=================================
Son: "Dad, what is malware?"
Dad: "I don't know, son, we use COMODO."
=================================

Offline liosant

  • Comodo's Hero
  • *****
  • Posts: 823
Re: Windows updates can be intercepted and injected with malware
« Reply #1 on: August 11, 2015, 05:56:06 PM »
Perhaps the error is not exactly that but how firewalls are generally configured.
Across the very supplier updates, if the microsoft. Every update, the IPs to which the machines are connected change.
Allow the process responsible for the updates are made without doors and ips are specific, continue vulnerareis. Example: The windows firewall is configured to allow ports 80 and 443, the problem is that in this case, any application can access the internet through the process (the same applies to third-party firewalls).
The Microsoft and many large companies, share your network with other service providers other than the windows update itself in the case of Microsoft, social networks ... Set this to common User would be tiring.

The windows firewall allows you to configure connections for specific services, but does not work well. If studying security suites, you'll see that there is a dependency of application blocking modules (based on HIPS) and not connections (firewalls).

Meanwhile we have to wait.
Command prompt is opened by secure applications, but secure applications can be used by malware or unknown files to run command lines

 

Seo4Smf 2.0 © SmfMod.Com Smf Destek