Zero-Day Vulnerability affects Chrome and Windows 7

Security analysts at Google and Microsoft have watched assailants utilizing a mix of a fixed Chrome weakness and an unpatched Windows 7 vulnerability. The declaration of the issue comes as a major aspect of their vulnerability disclosure policy. Both the Windows bug and Chrome bug deal with accessing memory that should not be accessed by the user. 

Most current internet browsers utilize a “sandbox” to help ensure against online assaults. This is like a virtual environment that websites, and their corresponding code, run in. These sandboxes are supposed to guarantee that untrustworthy code can’t get out and attack important system assets, however joining these two bugs together into causes just that.

Google fixed their bug last Friday. Unlike other updates which you can see immediately, this fix requires a manual restart. The Windows 7 bug has yet to be fixed but is believed to only affect Windows 7 32-bit systems. Meanwhile, Microsoft is urging Windows 7 users to upgrade to Windows 10.

Give us a call or email us to assess your vulnerabilities!

Phone: 952-223-4422

Email: Helpdesk@re2tech.com

Share This Article

E-Waste, e-waste recycling, computer recycling, electronic waste recycling, electronic waste, how to properly recycle your electronics electronic recycling

The Importance of E-Waste Recycling

E-Waste is Becoming A Major Problem The world is becoming increasingly dependent on electronics. We use our phones and computers more than ever to communicate, shop, and entertain ourselves. But with this increased reliance comes an increased waste stream. Environmental activists have been sounding the alarm about the amount of e-waste being produced in recent

Read More »
Phishing scams, how to detect phishing scams, how to detect fake messages, fake emails, scam emails, how to identify scam emails

How to Detect Phishing Scams

It’s important to spot a phishing scam so you don’t accidentally give away your personal information or money. Phishing scams are a type of online fraud that attempt to steal your personal information. Four Signs to Look for in a Phishing Scam Spotting a phishing scam can be difficult, but there are some signs you can look

Read More »
cyber security, security, cyber security for business, cyber security and insurance, cyber insurance, cyber security compliance, cyber insurance compliance

Cyber Security Insurance and Compliance for Businesses: What You Need to Know

When COVID-19 lockdowns first began, many companies had to allow their workers to work from home. As more devices entered corporate networks, businesses faced more threats from outside hackers. These threats forced companies to increase their cyber security.  But, sometimes your cyber security isn’t enough. Hackers may infiltrate your system and cause your company significant problems.

Read More »