Vulnerability found in Windows Defender the worst ever?

10 May 2017

Windows Defender

In the most recent notable piece of news concerning data protection, a vulnerability was discovered in Microsoft’s malware protection engine by a vulnerability researcher at Google.


Microsoft responded in record time, taking 3 days versus an anticipated several weeks to patch what was described as “the worst Windows remote code exec in recent memory.” 


Are you up to date?

Check if your Windows PC has been updated to the most recent version by going to "Windows Defender settings.”

If the Engine version number is 1.1.13704.0 or higher, it means you are up to date.

It means you've been patched.

This patch is relevant to Windows 7, 8, 8.1, and 10 and Server 2016.

 More on this story here

Update and Scan

If you are running antivirus software, It’s no good just updating and not scanning.


Typically anti-virus systems scan and block virae as it comes into the pc.

When you update your antivirus, it downloads defenses against the latest virus.

It can then recognise and prevent them from executing malware on your pc.

However, you need to do a FULL scan of your machine, not just the 5-minute quick scan, to see if the malware is already in your system, which the antivirus is now equipped to recognise.


There is an argument now by the browser developers that it is harder to develop secure systems when the installation and nature of antivirus software compromise the integrity.


It has to be a reality that the antivirus software programmes that we invite and download on our machines have got to be the top targets for hackers to install trojan horses.

Recent Blogs