Public Service Announcement – Microsoft Emergency Bulletin

by admin on June 4, 2012

Microsoft released the following emergency bulletin regarding the “Flame” malware:

Microsoft Emergency Bulletin: Unauthorized Certificate used in “Flame”

“Microsoft just released an emergency bulletin, and an associated
patch, notifying users of Windows that a “unauthorized digital
certificates derived from a Microsoft Certificate Authority” was used
to sign components of the “Flame” malware.”

I recommend that you download and apply any high-priority patches that your Windows operating system identifies as being outstanding.  One of them will have to do with revocation of certificate authority.  That is technospeak for fixing a bad security hole that has been exploited by the makers of the “Flame” malware, which is extremely sophisticated and dangerous.  They’ve actually used a valid Microsoft security certificate to fool target computers into thinking a portion of “Flame” is certified by Microsoft, so the target computers let down their guard entirely.  The patch from Microsoft closes this hole.

The patch will download and install if you go to Start > Help and Support > Keep your computer up-to-date with Windows Update, then use either the Express or regular update methods & follow the instructions there.  (That’s the Windows XP version of the path; Windows 7 & other variants will have a slightly different path.)  You’ll have to restart your computer after the installation.

{ 4 comments… read them below or add one }

~Dessa~ June 4, 2012 at 10:27 am

Thanks Admin. I am installing the patch now.


girl_with_all_the_yarn June 4, 2012 at 3:20 pm

So I would assume that the creators of Flame are going to rot in e-hell, right?


Mabel June 4, 2012 at 11:20 pm

Thank you. Updating my little laptop. Will do the big one tomorrow and see if my XP Doofus Desktop needs one as well.


sstabeler June 5, 2012 at 7:56 am

thanks for the warning, but my computer had already downloaded & installed the update.


Leave a Comment

Previous post:

Next post: