{"id":1578,"date":"2021-08-02T10:23:00","date_gmt":"2021-08-02T17:23:00","guid":{"rendered":"https:\/\/www.karlstechnology.com\/blog\/?p=1578"},"modified":"2021-08-02T07:24:16","modified_gmt":"2021-08-02T14:24:16","slug":"hackers-exploit-os-bugs","status":"publish","type":"post","link":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/","title":{"rendered":"Hackers Exploit OS Bugs"},"content":{"rendered":"\n<p>When updates become available, bugs and vulnerabilities follow behind. These, while nuisances, are usually quickly handled and fixed by the development teams. The time in between, however, is an opportunity for hackers to steal information.<\/p>\n\n\n\n<p>For example, back in August 2020&nbsp;<a href=\"https:\/\/www.cyberscoop.com\/citrix-xenmobile-bug-positive-technologies\/\">Cyberscoop<\/a>&nbsp;shared a blog post, explaining that hackers can exploit bugs:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cThe bugs are in a software product known as Citrix Endpoint Management or XenMobile, which allows clients to remotely connect to corporate networks with their mobile devices. Exploiting one of the bugs could let a hacker steal domain account credentials for a corporate network, according to Andrey Medov, a security researcher at Positive Technologies, which found the flaw during a security audit for a client. From there, an attacker could target other company resources like corporate mail and web applications.\u201d&nbsp;<\/p><\/blockquote>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.computerrepairchandleraz.com\/blog\/wp-content\/uploads\/2021\/01\/My-Post-7-700x367.png\" alt=\"\" class=\"wp-image-120\" \/><\/figure>\n\n\n\n<p>These flaws in computer technology cost companies millions of dollars. According to\u00a0<a href=\"https:\/\/www.capita.com\/sites\/g\/files\/nginej146\/files\/2020-08\/Ponemon-Global-Cost-of-Data-Breach-Study-2020.pdf\">Capita.com<\/a>, the recovery cost last year of a data breach was $3.86 million. So software development teams have to work fast to shorten the vulnerability window for hackers.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p>If you are having issues with your PC, please give us a call at\u00a0<a href=\"tel:1-800-620-5285\">1-800-620-5285<\/a>. \u00a0Karls Technology is a nationwide computer service company with offices in many\u00a0major cities. \u00a0This blog post is brought to you from our staff at\u00a0the\u00a0Plano Computer Repair Service. If you need\u00a0<a href=\"https:\/\/www.scottsdalecomputerrepairservice.net\/\">computer repair in Plano, TX<\/a>\u00a0please call the local office at\u00a0<a href=\"tel:469-299-9005\">(469) 299-9005<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When updates become available, bugs and vulnerabilities follow behind. These, while nuisances, are usually quickly handled and fixed by the development teams. The time in between, however, is an opportunity for hackers to steal information. For example, back in August 2020&nbsp;Cyberscoop&nbsp;shared a blog post, explaining that hackers can exploit bugs: \u201cThe bugs are in a [&hellip;]<\/p>\n","protected":false},"author":22392,"featured_media":1366,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[69,52],"class_list":["post-1578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computerrepair","tag-hackers","tag-operating-system"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers Exploit OS Bugs - Computer Repair Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Exploit OS Bugs - Computer Repair Blog\" \/>\n<meta property=\"og:description\" content=\"When updates become available, bugs and vulnerabilities follow behind. These, while nuisances, are usually quickly handled and fixed by the development teams. The time in between, however, is an opportunity for hackers to steal information. For example, back in August 2020&nbsp;Cyberscoop&nbsp;shared a blog post, explaining that hackers can exploit bugs: \u201cThe bugs are in a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Repair Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/karlstechnology\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-02T17:23:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-02T14:24:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/01\/My-Post-45.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristin Willis\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristin Willis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/\"},\"author\":{\"name\":\"Kristin Willis\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\"},\"headline\":\"Hackers Exploit OS Bugs\",\"datePublished\":\"2021-08-02T17:23:00+00:00\",\"dateModified\":\"2021-08-02T14:24:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/\"},\"wordCount\":240,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/01\/My-Post-45.png\",\"keywords\":[\"hackers\",\"Operating System\"],\"articleSection\":[\"Computer Repair\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/\",\"name\":\"Hackers Exploit OS Bugs - Computer Repair Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/01\/My-Post-45.png\",\"datePublished\":\"2021-08-02T17:23:00+00:00\",\"dateModified\":\"2021-08-02T14:24:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#primaryimage\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/01\/My-Post-45.png\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/01\/My-Post-45.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.karlstechnology.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Exploit OS Bugs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"name\":\"Computer Repair Blog\",\"description\":\"Karls Technology Computer Repair\",\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\",\"name\":\"Karls Technology\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"width\":800,\"height\":99,\"caption\":\"Karls Technology\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/karlstechnology\",\"https:\/\/x.com\/karlstechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\",\"name\":\"Kristin Willis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"caption\":\"Kristin Willis\"},\"sameAs\":[\"https:\/\/www.karlstechnology.com\"],\"url\":\"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Exploit OS Bugs - Computer Repair Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Exploit OS Bugs - Computer Repair Blog","og_description":"When updates become available, bugs and vulnerabilities follow behind. These, while nuisances, are usually quickly handled and fixed by the development teams. The time in between, however, is an opportunity for hackers to steal information. For example, back in August 2020&nbsp;Cyberscoop&nbsp;shared a blog post, explaining that hackers can exploit bugs: \u201cThe bugs are in a [&hellip;]","og_url":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/","og_site_name":"Computer Repair Blog","article_publisher":"https:\/\/www.facebook.com\/karlstechnology","article_published_time":"2021-08-02T17:23:00+00:00","article_modified_time":"2021-08-02T14:24:16+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/01\/My-Post-45.png","type":"image\/png"}],"author":"Kristin Willis","twitter_misc":{"Written by":"Kristin Willis","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#article","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/"},"author":{"name":"Kristin Willis","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d"},"headline":"Hackers Exploit OS Bugs","datePublished":"2021-08-02T17:23:00+00:00","dateModified":"2021-08-02T14:24:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/"},"wordCount":240,"commentCount":0,"publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/01\/My-Post-45.png","keywords":["hackers","Operating System"],"articleSection":["Computer Repair"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/","url":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/","name":"Hackers Exploit OS Bugs - Computer Repair Blog","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#primaryimage"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/01\/My-Post-45.png","datePublished":"2021-08-02T17:23:00+00:00","dateModified":"2021-08-02T14:24:16+00:00","breadcrumb":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#primaryimage","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/01\/My-Post-45.png","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/01\/My-Post-45.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-exploit-os-bugs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.karlstechnology.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Exploit OS Bugs"}]},{"@type":"WebSite","@id":"https:\/\/www.karlstechnology.com\/blog\/#website","url":"https:\/\/www.karlstechnology.com\/blog\/","name":"Computer Repair Blog","description":"Karls Technology Computer Repair","publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.karlstechnology.com\/blog\/#organization","name":"Karls Technology","url":"https:\/\/www.karlstechnology.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","width":800,"height":99,"caption":"Karls Technology"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/karlstechnology","https:\/\/x.com\/karlstechnology"]},{"@type":"Person","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d","name":"Kristin Willis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","caption":"Kristin Willis"},"sameAs":["https:\/\/www.karlstechnology.com"],"url":"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1578"}],"collection":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/users\/22392"}],"replies":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/comments?post=1578"}],"version-history":[{"count":1,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1578\/revisions"}],"predecessor-version":[{"id":1579,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1578\/revisions\/1579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media\/1366"}],"wp:attachment":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media?parent=1578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/categories?post=1578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/tags?post=1578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}