Security News > 2018 > November > Researcher Bypasses Windows UAC by Spoofing Trusted Directory

Researcher Bypasses Windows UAC by Spoofing Trusted Directory
2018-11-12 19:34

A security researcher from Tenable, Inc. recently discovered that it is possible to bypass Windows’ User Account Control (UAC) by spoofing the execution path of a file in a trusted directory.  read more


News URL

http://feedproxy.google.com/~r/Securityweek/~3/xwK42jzeEAw/researcher-bypasses-windows-uac-spoofing-trusted-directory