This article is more than 1 year old
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
Another Patch Update Tuesday, another red face for Microsoft, which has again been forced to pull a patch to prevent nasty side-effects.
Explained at TechNet, the patch that aimed to add “SHA-2 Hashing” to Windows 7 and Windows Server 2008 R2 has instead raised some concerns among Redmond's customers.
The company is therefore “investigating behavior associated with this update” and recommends those who have installed the patch and have found things have gone awry should uninstall the software.
Redmond's reputation for reliable repairs is taking a battering at present, as recalls were required for patches issued in September and August.
Microsoft recently renamed its monthly delivery of patches to “Update Tuesday”, a rather more upbeat name than the traditional “Patch Tuesday”. Perhaps Redmond now needs to rename it “Temporary Update Tuesday”? ®
More about
More about
Narrower topics
- 2FA
- Active Directory
- Advanced persistent threat
- Application Delivery Controller
- Authentication
- Azure
- BEC
- Bing
- Black Hat
- BSides
- BSoD
- Bug Bounty
- CHERI
- Common Vulnerability Scoring System
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- DDoS
- DEF CON
- Digital certificate
- Encryption
- Excel
- Exchange Server
- Exploit
- Firewall
- Hacker
- Hacking
- Hacktivism
- HoloLens
- Identity Theft
- Incident response
- Infosec
- Internet Explorer
- Kenna Security
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Ignite
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- NCSAM
- NCSC
- .NET
- Office 365
- OS/2
- Outlook
- Palo Alto Networks
- Password
- Phishing
- Pluton
- Quantum key distribution
- Ransomware
- Remote Access Trojan
- REvil
- RSA Conference
- SharePoint
- Skype
- Spamming
- Spyware
- SQL Server
- Surveillance
- TLS
- Trojan
- Trusted Platform Module
- Visual Studio
- Visual Studio Code
- Vulnerability
- Wannacry
- Windows
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows Subsystem for Linux
- Windows XP
- Xbox
- Xbox 360
- Zero trust
Broader topics
More about
More about
More about
Narrower topics
- 2FA
- Active Directory
- Advanced persistent threat
- Application Delivery Controller
- Authentication
- Azure
- BEC
- Bing
- Black Hat
- BSides
- BSoD
- Bug Bounty
- CHERI
- Common Vulnerability Scoring System
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- DDoS
- DEF CON
- Digital certificate
- Encryption
- Excel
- Exchange Server
- Exploit
- Firewall
- Hacker
- Hacking
- Hacktivism
- HoloLens
- Identity Theft
- Incident response
- Infosec
- Internet Explorer
- Kenna Security
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Ignite
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- NCSAM
- NCSC
- .NET
- Office 365
- OS/2
- Outlook
- Palo Alto Networks
- Password
- Phishing
- Pluton
- Quantum key distribution
- Ransomware
- Remote Access Trojan
- REvil
- RSA Conference
- SharePoint
- Skype
- Spamming
- Spyware
- SQL Server
- Surveillance
- TLS
- Trojan
- Trusted Platform Module
- Visual Studio
- Visual Studio Code
- Vulnerability
- Wannacry
- Windows
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows Subsystem for Linux
- Windows XP
- Xbox
- Xbox 360
- Zero trust