Microsoft’s Advisory are shown below:
Windows 8 | |||||
---|---|---|---|---|---|
Bulletin Identifier | Bulletin 1 | Bulletin 2 | Bulletin 4 | Bulletin 5 | Bulletin 3 |
Aggregate Severity Rating | None | Critical | Critical | Critical | None |
Windows 8 for 32-bit Systems | Not applicable | Windows 8 for 32-bit Systems (Critical) | Windows 8 for 32-bit Systems (Critical) | Windows 8 for 32-bit Systems (Critical) | Not applicable |
Windows 8 for 64-bit Systems | Not applicable | Windows 8 for 64-bit Systems (Critical) | Windows 8 for 64-bit Systems (Critical) | Windows 8 for 64-bit Systems (Critical) | Not applicable |
Windows Server 2012 | |||||
Bulletin Identifier | Bulletin 1 | Bulletin 2 | Bulletin 4 | Bulletin 5 | Bulletin 3 |
Aggregate Severity Rating | None | Critical | Critical | Critical | None |
Windows Server 2012 | Not applicable | Windows Server 2012 (Critical) | Windows Server 2012 (Critical) | Windows Server 2012 (Critical) | Not applicable |
Windows RT | |||||
Bulletin Identifier | Bulletin 1 | Bulletin 2 | Bulletin 4 | Bulletin 5 | Bulletin 3 |
Aggregate Severity Rating | None | None | Important | Critical | None |
Windows RT | Not applicable | Not applicable | Windows RT (Important) | Windows RT (Critical) | Not applicable |
The malware that successfully bypassed Windows Defender was capable of granting backdoor access to the system, intercepting keystrokes, stealing online games credentials, and more. When tested without Windows Defender activated, the results were worse. Of the 385 samples, 234 ran successfully. Another 138 samples could not be started on the machine on various reasons, six e-threats executed but then crashed, and seven others launched but had their payload was blocked by UAC (User Account Control).NBC News contacted Microsoft for comment about Bitdefender’s study. “Microsoft is committed to providing a trustworthy computing experience and continues to invest heavily in continuously improving our security and protection technologies,” a company spokesman said in an emailed statement. Bitdefender said the malicious sample set it used “consisted of the families of malware detected most frequently in the past six months” by its own real-time virus reporting system. The malware that successfully bypassed Windows Defender was capable of granting backdoor access to the system, intercepting keystrokes, stealing online games credentials, and more. When tested without Windows Defender activated, the results were worse. Of the 385 samples, 234 ran successfully. Another 138 samples could not be started on the machine on various reasons, six e-threats executed but then crashed, and seven others launched but had their payload was blocked by UAC (User Account Control). “Even if the new operating system boasts a major overhaul in terms of visuals with the introduction of the Advanced UI, Windows 8 with the default antivirus solution activated registers alarming detections rates similar to the one registered by Windows 7,” said Alexandru Balan, Bitdefender chief security researcher, said in a statement. Bitdefender insists therefore that additional third-party protection for user PCs, such as its own solution, is a must for users to avoid compromised systems.]]>
Article Tags:
Bitdefender · Critical · Malware · Microsoft · Security Update · Surface · Windows 8 · Windows 8 RT · Windows server 2012Article Categories:
Microsoft
All Comments
Hasn’t Windows Defender always been complementary to something like AVG or other AV software? I don’t remember ever getting the impression it was touted as good enough to run on its own.