Windows Updates July 2017

‘Patch Tuesday’ falls on the second Tuesday of every month (or the Wednesday following the Tuesday for us Aussies). Microsoft use this day to release software updates, known as ‘patches’, for Microsoft products.

Patches fix a range of vulerabilities helping to keep your computer secure.  Updates are also released to fix other problems in software to keep your computer running at its best.

This months ‘Patch Tuesday’ fixes critial vulnerabilities in Adobe Flash Player, Internet Explorer 9 & 11, Micosoft Edge, Windows version 7 through to 10, and Windows Server 2008 through to 2016.

There are also important updates for Microsoft Office products, .NET Framework, and Microsoft Exchance Server.

Moderate updates for Internet Explorer 10 are also included.

Installing Windows Updates

Windows Updates are usually installed automatically, but it doesn’t hurt to manually check for the updates upon their release. By manually checking you can monitor whether the updates have been installed.

Updates for Microsoft products, except Office 2013 – 2016, can be installed via Windows Updates. To install these updates, follow the steps below:

  1. On your keyboard, hold the windows key and press R. This will display the run dialog box.
  2. Type in “control update” and press enter
    windows-updates-march-2017
  3. Click “Check for Updates”. This may take some time as Windows Update searches for the latest patches.
  4. Click on Install Updates, updates will install, after which Windows may need to restart.

Downloading Updates for Office 2013 – 2016

Updates for Office 2013 – 2016 are installed via Office Updater, rather than through Windows Update. To install these updates, open up a program from the Office suite, i.e Word, and then follow these simple steps.

  • Click “File”
  • Click “Account”
  • Click “Update Options”
  • Click “Update Now”

The updates for Office will then download and install.


Ensuring you are running up-to-date software is a great way to help ensure you device is secure. For more ways to stay secure read our Tech Tips articles.

Perform a Malware Scan with Microsoft Malicious Software Removal tool

Microsoft Malicious Software Removal is a standalone malware scanning tool, included as part of Windows. This tool is updated each month, and a quick scan is performed.

A quick scan scans key parts of the hard drive, finding malware in the usual spots. Occasionally malware could be hiding on another part of the drive.

Performing a full scan can help detect hidden malware running on your PC.

Running a full scan is simple, and works great, running alongside your current Antivirus Solution, in helping to prevent malware from infecting your machine.


To run a scan, hold down the Windows Key on your keyboard and press R. You will be prompted with the run dialog box.

Type in mrt and press enter.

You will be presented with the Windows Malicious Software Removal Tool. Press Next.

Select the option to perform a Full Scan. This may take several hours.


The Microsoft Malicious Software Removal Tool will automatically remove infections it finds. You will be prompted you to run a second scan if infections are found, to ensure they have been fully removed.

Microsoft Malicious Software Removal Tool is not a replacement for Antivirus, but is a great tool to work alongside your current Antivirus to help keep your PC free from malware.

Phishing

There are many variants of phishing emails that do the rounds. Often I will do a write up on a phish that look most authentic and managed to get past my spam filtering, such as in the past with NAB, Commbank, and MyGov phishing emails.

Phishing emails work by baiting the victim into clicking a link, opening an attachment, or replying with information. Phishing plays on a need of urgency. This is a trick used by the scammer to help trick the victim into taking the bait.

Links may lead to a website designed to harvest credentials for email, financial services, or other websites. Attachments may lead to malware infection, such as ransomware. Emails that ask you to reply with information may ask for personal details to use for identity fraud, or ask for credentials for online services.

Another type of phish, with a much higher success rate, is spear-phishing. This is a targeted attack, meaning the phish, is sent to one user. Before sending a spear-phishing email, an attacker will need to research the individual. The more information the attacker can gather, possibly from over sharing on social media, the higher the chance the user will take the bait.

A spear-phish is used when the attacker has a goal in mind. The goal might be to compromise the organisation in which you work. In this case the attacker will do his homework, and send you a specially crafted email. This email could appear to come from your boss, or other work colleagues. The attacker, posing as another employee, might ask for your latest password for the financial system. Or even ask you to check over the attached document. The document could contain malware allowing the attacker to infiltrate the company network.

Phishing can be very hard to protect against, but there are some steps to take:

  • Don’t act on a sense of urgency. This is a tactic used by an attacker to lower your guard and not give you time to properly analyse the request.
  • Double check the sender is legitimate. If you receive a request for sensitive information, confirm that the person you received the request from is who they say they are. Contact them via another means, i.e. via Telephone. But don’t call the number provided in the suspect email.
  • Scan links and attachments with a service such as Virus Total.
  • Ask a friend for advice. Even if the friend is not tech savvy, sometimes talking about something out loud will help you to see it is a scam.

Report a Scam

Phishing and other scams can be reported to Scam Watch.

Computer Maintenance & Repairs, Custom Built Computers, Laptops and more.