Isn't the title the inverse? "23 ways to STOP remotely pwn Windows..."
I think these patches are meant to correct flaws in all these systems/applications rather than introduce new ones.
However, given the players, I could be mistaken.
Microsoft has given IT admins and folks another busy Patch Tuesday with 129 security vulnerabilities to address. The Redmond giant has posted fixes for CVE-listed bugs in its latest monthly security update, including 23 that allow for remote code execution. The massive bundle is not entirely unexpected, as security experts …
Well as the article says patch Tuesday then exploit Wednesday.
I’m sure someone will be busy working out how to exploit machines which haven’t got the patches installed yet, and probably have something out to spam users with tonight...
think of all of the 'feature creep' that did NOT happen because Micros~1 was busy patching. *
Hopefully they were ALL tested properly first... don't need another un-bootable version of Windows now do we?
(*) I wish they kept at it with the testing and patching, and simply gave up on the feature creep, at least for a while.
I'm not sure whether to be upset because this is the 7th firmware update in the last two years, or to be smug because my 3+ year old router is still getting security updates. My experience with a Samsung phone only getting one year of updates has definitely lowered my expectations.
Wish it were possible with mine. My ISP has locked the OS down so much I can't do anything reasonable with the bloody thing.
Roll on next week when I get a replacement unit to try and configure and plug in.
[And if anyone knows any way of decoding the binary dump of user data from a ZTE H298A router, it'd be appreciated]