{"id":2825,"date":"2017-10-10T13:54:27","date_gmt":"2017-10-10T13:54:27","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=2825"},"modified":"2021-02-24T14:06:48","modified_gmt":"2021-02-24T08:36:48","slug":"fix-top-10-windows-vulnerabilities","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/","title":{"rendered":"Top Windows 10 OS Vulnerabilities and How to Fix Them [Guidelines]"},"content":{"rendered":"<p>Microsoft has released a free upgrade for Genuine Windows 10 and Windows 8\/8.1 users. A free upgrade is on the line, which will give them an added advantage viz-a-viz better security. The new Windows Device Guard, Hello, and Passport. Nevertheless, with this latest offering, Windows has always been in the news for its security flaws.<\/p>\n<p>All software around the world is prone to vulnerabilities and keep it safe from attack is the key to success. Here are the top 10 flaws in Windows 10, and how to address it.<\/p>\n<div itemtype=\"http:\/\/schema.org\/ItemList\">\n<h2>Top Windows 10 OS Vulnerabilities \u2013 Latest Listing 2019<\/h2>\n<ol itemprop=\"itemListOrder\" href=\"http:\/\/schema.org\/ItemListOrderAscending\">\n<meta itemprop=\"numberOfItems\" content=\"10\"\/><\/p>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"1\"\/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">(CVE-2015-0057) Win32k Elevation of Privilege Vulnerability<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"2\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Windows 10 WiFi Sense Contact Sharing<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"3\"\/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">(MS15-078) Microsoft Font Driver Vulnerability<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"4\"\/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">(MS15-092) .NET Framework Escalation of Privilege Vulnerability<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"5\"\/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">(CVE-2015-5143) Redirect to SMB Vulnerability<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"6\"\/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">(MS15-098) Microsoft Windows Journal Vulnerability<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"7\"\/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">(MS15-079) Internet Explorer Vulnerabilities<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"8\"\/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">(MS15-080) Microsoft Graphics Component Vulnerabilities<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"9\"\/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">(MS15-091) Microsoft Edge Vulnerabilities<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"10\"\/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Windows 10 Mount Manager Vulnerability (CVE-2015-1769, MS15-085)<\/li>\n<\/div>\n<\/div>\n<\/ol>\n<\/div>\n<p><strong>1. (CVE-2015-0057) Win32k Elevation of Privilege Vulnerability<\/strong><\/p>\n<p>This is a flaw in Windows 10 GUI component, commonly known as the scrollbar element, which allows the hackers to gain control of a Windows machine through privilege escalation. Microsoft has <a href=\"https:\/\/www.itarian.com\/patch-management.php\" target=\"_blank\">released a patch<\/a> to fix this flaw.<\/p>\n<p><strong>2. Windows 10 WiFi Sense Contact Sharing<\/strong><\/p>\n<p>By default, Windows 10 will share your wifi credentials to Outlook, Skype, and Facebook contacts\u2014presumably to make wifi and hotspot sharing easier. This makes it possible for any of these said contacts to hop onto your WiFi network\u2014if in proximity\u2014without authorization. While not necessarily a software vulnerability, this feature can lead to compromises, and should be remediated through the following steps:<\/p>\n<p>Windows by default have been designed in a way that makes hotspot sharing easily, the credentials are with Skype, outlook, and even Facebook. So this makes it vulnerable as any contact with proximity to snoop into your WiFi without authorization. This may not be a vulnerability, but it gives way to the hacker to compromise. This can be rectified with the following steps.<\/p>\n<p>Change the wifi network name\/SSID to include the terms \u201c_nomap_optout,&#8221; prior to upgrading to Windows 10.<\/p>\n<p>Post-upgrade, change your Windows privacy settings to disable Wifi Sense sharing.<\/p>\n<p><strong>3. (MS15-078) Microsoft Font Driver Vulnerability<\/strong><\/p>\n<p>Adobe Type Manager in Windows at times are not able to handle the OpenType fonts, this results in remote code execution, and its a vulnerability. This gives attackers the room to gain access to the system and install programs, and create new accounts view\/change\/delete data. Though Microsoft has released a patch for this flaw, still this can be manually downloaded and installed.<\/p>\n<p><strong>4. (MS15-092) .NET Framework Escalation of Privilege Vulnerability<\/strong><\/p>\n<p>This is the another version of the above point No.1. The .NET application can enable privilege exploits, where the user is tricked to run the application. You can read more about this vulnerability on Microsoft item security bulletin page.<\/p>\n<p><strong>5. (CVE-2015-5143) Redirect to SMB Vulnerability<\/strong><\/p>\n<p>A flaw that has the ability to impact all the versions of Windows. A core Window API library that connects with Windows SMB. This results in Windows user getting redirected to a malicious SMB-based server, and then their credentials get stolen. The best way to stop this is to block TCP ports 139 and 445 and disable SMB.<\/p>\n<p><strong>6. (MS15-098) Microsoft Windows Journal Vulnerability<\/strong><\/p>\n<p>When the user opens a specially-crafted Journal file, it tends to allow remote code execution. More details can be sought on the <a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-windows-7\/\" target=\"_blank\" rel=\"noopener\">Windows security<\/a> bulletin page.<\/p>\n<p><strong>7. (MS15-079) Internet Explorer Vulnerabilities<\/strong><\/p>\n<p>Remember Microsoft&#8217;s browser, which also has its share of vulnerabilities that come with Windows 10. The most dangerous of the flaw is that it allows the hackers to gain access to the system through the browser. The details of the patch are available on the security bulletin page.<\/p>\n<p><strong>8. (MS15-080) Microsoft Graphics Component Vulnerabilities<\/strong><\/p>\n<p>A flaw related graphic memory management and fonts, and this results in remote code execution, which directs you to some dubious website with embedded fonts. Visit the Microsoft website and get the patch under a security bulletin page.<\/p>\n<p><strong>9. (MS15-091) Microsoft Edge Vulnerabilities<\/strong><\/p>\n<p>The Microsoft Edge (browser) was never in the list of the secured browser. The various remote code execution and security bypass exploits enabled hackers to gain control over the system. Visit the Microsoft website and get the patch under a security bulletin page.<\/p>\n<p><strong>10. Windows 10 Mount Manager Vulnerability (CVE-2015-1769, MS15-085)<\/strong><\/p>\n<p>This vulnerability involves the potential escalation of privilege by inserting a USB device into the target system. Through this method, an attacker could write a malicious binary to disk and execute the code. An update is available from Microsoft to patch this vulnerability.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/5-simple-steps-to-protect-your-pc-from-virus-2\/\">How to Protect Computer from Virus?<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources:<\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"blank\">https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/five-best-virus-and-malware-removal-tools\/\" target=\"blank\">Best Virus Removal<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" target=\"blank\" rel=\"noopener\">Website Status<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.itarian.com\/itsm\/benefits-of-itsm.php\" rel=\"noopener\" target=\"_blank\">Benefits Of ITSM<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released a free upgrade for Genuine Windows 10 and Windows 8\/8.1 users. A free upgrade is on the line, which will give them an added advantage viz-a-viz better security. The new Windows Device Guard, Hello, and Passport. Nevertheless, with this latest offering, Windows has always been in the news for its security flaws. [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":2746,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[121,41],"class_list":["post-2825","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-vulnerability","tag-windows-10-antivirus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top Windows 10 OS Vulnerabilities and How to Fix Them[Guidelines]<\/title>\n<meta name=\"description\" content=\"Understand the top 10 Windows OS vulnerabilities and learn the steps for fixing any kind of vulnerability on your Microsoft Windows PC. Know more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Windows 10 OS Vulnerabilities and How to Fix Them[Guidelines]\" \/>\n<meta property=\"og:description\" content=\"Understand the top 10 Windows OS vulnerabilities and learn the steps for fixing any kind of vulnerability on your Microsoft Windows PC. Know more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-10T13:54:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-24T08:36:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/08\/malware-prevention.png\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/\",\"name\":\"Top Windows 10 OS Vulnerabilities and How to Fix Them[Guidelines]\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/08\/malware-prevention.png\",\"datePublished\":\"2017-10-10T13:54:27+00:00\",\"dateModified\":\"2021-02-24T08:36:48+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Understand the top 10 Windows OS vulnerabilities and learn the steps for fixing any kind of vulnerability on your Microsoft Windows PC. Know more.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/08\/malware-prevention.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/08\/malware-prevention.png\",\"width\":650,\"height\":300,\"caption\":\"Adware Removal Tool\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top Windows 10 OS Vulnerabilities and How to Fix Them [Guidelines]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Windows 10 OS Vulnerabilities and How to Fix Them[Guidelines]","description":"Understand the top 10 Windows OS vulnerabilities and learn the steps for fixing any kind of vulnerability on your Microsoft Windows PC. Know more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Top Windows 10 OS Vulnerabilities and How to Fix Them[Guidelines]","og_description":"Understand the top 10 Windows OS vulnerabilities and learn the steps for fixing any kind of vulnerability on your Microsoft Windows PC. Know more.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2017-10-10T13:54:27+00:00","article_modified_time":"2021-02-24T08:36:48+00:00","og_image":[{"width":650,"height":300,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/08\/malware-prevention.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/","name":"Top Windows 10 OS Vulnerabilities and How to Fix Them[Guidelines]","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/08\/malware-prevention.png","datePublished":"2017-10-10T13:54:27+00:00","dateModified":"2021-02-24T08:36:48+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Understand the top 10 Windows OS vulnerabilities and learn the steps for fixing any kind of vulnerability on your Microsoft Windows PC. Know more.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/08\/malware-prevention.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/08\/malware-prevention.png","width":650,"height":300,"caption":"Adware Removal Tool"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/fix-top-10-windows-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Top Windows 10 OS Vulnerabilities and How to Fix Them [Guidelines]"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/2825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=2825"}],"version-history":[{"count":28,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/2825\/revisions"}],"predecessor-version":[{"id":15900,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/2825\/revisions\/15900"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/2746"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=2825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=2825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=2825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}