Updating your operating system can be a major pain in the neck. The new software can be buggy at first, some of your old programs can lose compatibility, and worst of all, your computer might be out of commission for hours. It’s no wonder that so many people still choose to keep the same operating system their computer came with. As the saying goes: “If it ain’t broke, don’t fix it.”
This time, however, you might want to look into fixing your system. A major security threat has been identified by Microsoft, one that potentially targets Windows computers with out-of-date software.
This vulnerability can spell disaster for personal data and, if left untouched, could spread malware rapidly across the internet.
Thankfully, Microsoft has released a patch for its oldest, most vulnerable operating system — and it’s advising users to update as soon as possible. If Microsoft can successfully head off this vulnerability, millions of computers throughout the world could be saved from compromise. Here’s what you need to know about the Terminal Services security flaw, and what you can do to protect your own system.
Is my system affected by the latest Windows vulnerability?
In a blog post released by Microsoft, the company outlined a critical security flaw found in older versions of the Windows operating system. This bug affects a part of the software called Remote Desktop Services or Terminal Services.
Normally, these features allow a user to access their PC remotely with special software. But in the hands of an accomplished hacker, Remote Desktop is the perfect entryway to compromise a computer.
Dangerous malware like the WannaCry virus have previously used a similar vulnerability to run rampant across the web — jumping from computer to computer without any user input. If a new cyber weapon were to harness Remote Desktop Services, any computer with the security flaw could fall victim while spreading the virus to other systems.
This critical flaw was scary enough to prompt Microsoft to release patches for several of its oldest operating systems. This includes software they no longer support, such as Windows XP and Windows 7.
This is a very smart move on its part, as XP and 7 are still regularly used across the world for administrative purposes. Coincidentally, these are the kinds of systems that are most at-risk for collateral damage from the security flaw.