security meets culture
Microsoft Announces new Mobile-Style Windows Security Controls
By Sergiu Gatlan for bleepingcomputer
bleepingcomputer
Microsoft wants to introduce smartphone-style app permission prompts in Windows 11 to request user consent before apps can access sensitive resources such as files, cameras, and microphones.
The "Windows Baseline Security Mode" and "User Transparency and Consent" initiatives represent a major shift for the operating system that now <a href="https://blogs.windows.com/windowsexperience/2026/02/09/strengthening-windows-trust-and-security-through-user-transparency-and-consent/#:~:text=Windows%2011%20powers%20over%20a%20billion%20devices" title="Strengthening Windows trust and security through User Transparency and Consent" target="_blank">powers more than 1 billion devices</a>.
Windows Platform engineer Logan Iyer said that this new security model was prompted by applications increasingly overriding settings, installing unwanted software, or even modifying core Windows experiences without obtaining user consent.
After the transparency and consent changes roll out, Windows will prompt for permission when apps try to install unwanted software or access sensitive resources, as on smartphones, allowing users to change their choices at any time after accepting or denying access requests.
Windows Baseline Security Mode will enable runtime integrity safeguards by default, ensuring that only properly signed apps, services, and drivers can run, but still allowing users and IT administrators to override these safeguards for specific apps when needed.
"Just like they do today on their mobile phones, users will be able to clearly see which apps have access to sensitive resources, including file system, devices like camera and microphone, and others. If they see an app that they don't recognize, they will be able to revoke access," Iyer <a href="https://blogs.windows.com/windowsexperience/2026/02/09/strengthening-windows-trust-and-security-through-user-transparency-and-consent/" title="Strengthening Windows trust and security through User Transparency and Consent" target="_blank">said</a>.
"Users will have transparency and consent control over how apps access their personal data and device features. They will receive clear prompts to grant or deny apps permission to access protected data and hardware. Users will also be able to revoke permissions they have previously granted."
The changes will roll out as part of a phased approach developed "in close partnership" with developers, enterprises, and ecosystem partners, with Microsoft planning to adjust the rollout and the controls based on feedback.
The action is part of Microsoft's Secure Future Initiative (SFI), launched in November 2023 after the Cyber Safety Review Board of the US Department of Homeland Security <a href="https://www.cisa.gov/sites/default/files/2025-03/CSRBReviewOfTheSummer2023MEOIntrusion508.pdf" title="Review of the Summer 2023 Microsoft Exchange Online Intrusion" target="_blank">tagged the company's security culture</a> as "inadequate." The board's report was issued following an <a href="https://www.bleepingcomputer.com/news/security/microsoft-chinese-hackers-breached-us-govt-exchange-email-accounts/" title="Microsoft: Chinese hackers breached US govt Exchange email accounts" target="_blank">Exchange Online breach</a> by Storm-0558 Chinese hackers who <a href="https://www.bleepingcomputer.com/news/security/stolen-microsoft-key-offered-widespread-access-to-microsoft-cloud-services/" title="Stolen Microsoft key offered widespread access to Microsoft cloud services" target="_blank">stole a Microsoft consumer signing key</a> in May 2023 to gain widespread access to Microsoft cloud services.
As part of this initiative, Microsoft also announced plans to <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-to-secure-entra-id-sign-ins-from-external-script-injection-attacks/" title="Microsoft to secure Entra ID sign-ins from script injection attacks" target="_blank">secure Entra ID sign-ins</a> against script-injection attacks, has <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-blocks-activex-by-default-in-microsoft-365-office-2024/" title="Microsoft blocks ActiveX by default in Microsoft 365, Office 2024" target="_blank">disabled all ActiveX controls</a> in Microsoft 365 and Office 2024 Windows apps, and has <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-365-to-block-file-access-via-legacy-auth-protocols-by-default/" title="Microsoft 365 to block file access via legacy auth protocols by default" target="_blank">updated Microsoft 365 security defaults</a> to block access to SharePoint, OneDrive, and Office files via legacy authentication protocols.
"Apps and AI agents will also be expected to meet higher transparency standards, giving both users and IT administrators better visibility into their behaviors," Iyer added. "These updates raise the bar for security and privacy on Windows, while giving you more control and confidence in how your system and data are accessed."
The "Windows Baseline Security Mode" and "User Transparency and Consent" initiatives represent a major shift for the operating system that now <a href="https://blogs.windows.com/windowsexperience/2026/02/09/strengthening-windows-trust-and-security-through-user-transparency-and-consent/#:~:text=Windows%2011%20powers%20over%20a%20billion%20devices" title="Strengthening Windows trust and security through User Transparency and Consent" target="_blank">powers more than 1 billion devices</a>.
Windows Platform engineer Logan Iyer said that this new security model was prompted by applications increasingly overriding settings, installing unwanted software, or even modifying core Windows experiences without obtaining user consent.
After the transparency and consent changes roll out, Windows will prompt for permission when apps try to install unwanted software or access sensitive resources, as on smartphones, allowing users to change their choices at any time after accepting or denying access requests.
Windows Baseline Security Mode will enable runtime integrity safeguards by default, ensuring that only properly signed apps, services, and drivers can run, but still allowing users and IT administrators to override these safeguards for specific apps when needed.
"Just like they do today on their mobile phones, users will be able to clearly see which apps have access to sensitive resources, including file system, devices like camera and microphone, and others. If they see an app that they don't recognize, they will be able to revoke access," Iyer <a href="https://blogs.windows.com/windowsexperience/2026/02/09/strengthening-windows-trust-and-security-through-user-transparency-and-consent/" title="Strengthening Windows trust and security through User Transparency and Consent" target="_blank">said</a>.
"Users will have transparency and consent control over how apps access their personal data and device features. They will receive clear prompts to grant or deny apps permission to access protected data and hardware. Users will also be able to revoke permissions they have previously granted."
The changes will roll out as part of a phased approach developed "in close partnership" with developers, enterprises, and ecosystem partners, with Microsoft planning to adjust the rollout and the controls based on feedback.
The action is part of Microsoft's Secure Future Initiative (SFI), launched in November 2023 after the Cyber Safety Review Board of the US Department of Homeland Security <a href="https://www.cisa.gov/sites/default/files/2025-03/CSRBReviewOfTheSummer2023MEOIntrusion508.pdf" title="Review of the Summer 2023 Microsoft Exchange Online Intrusion" target="_blank">tagged the company's security culture</a> as "inadequate." The board's report was issued following an <a href="https://www.bleepingcomputer.com/news/security/microsoft-chinese-hackers-breached-us-govt-exchange-email-accounts/" title="Microsoft: Chinese hackers breached US govt Exchange email accounts" target="_blank">Exchange Online breach</a> by Storm-0558 Chinese hackers who <a href="https://www.bleepingcomputer.com/news/security/stolen-microsoft-key-offered-widespread-access-to-microsoft-cloud-services/" title="Stolen Microsoft key offered widespread access to Microsoft cloud services" target="_blank">stole a Microsoft consumer signing key</a> in May 2023 to gain widespread access to Microsoft cloud services.
As part of this initiative, Microsoft also announced plans to <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-to-secure-entra-id-sign-ins-from-external-script-injection-attacks/" title="Microsoft to secure Entra ID sign-ins from script injection attacks" target="_blank">secure Entra ID sign-ins</a> against script-injection attacks, has <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-blocks-activex-by-default-in-microsoft-365-office-2024/" title="Microsoft blocks ActiveX by default in Microsoft 365, Office 2024" target="_blank">disabled all ActiveX controls</a> in Microsoft 365 and Office 2024 Windows apps, and has <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-365-to-block-file-access-via-legacy-auth-protocols-by-default/" title="Microsoft 365 to block file access via legacy auth protocols by default" target="_blank">updated Microsoft 365 security defaults</a> to block access to SharePoint, OneDrive, and Office files via legacy authentication protocols.
"Apps and AI agents will also be expected to meet higher transparency standards, giving both users and IT administrators better visibility into their behaviors," Iyer added. "These updates raise the bar for security and privacy on Windows, while giving you more control and confidence in how your system and data are accessed."
That Extra Drive Letter in Windows? - Here's Why
Upgraded Google Safety Tools can now Find and Remove more of your
Personal Info
By Ryan Whitwam for Ars Technica
The Results About You tool is getting an upgrade.
The Results About You tool is getting an upgrade.
Credit: Aurich Lawson
Do you feel popular? There are people on the Internet who want to know all about you! Unfortunately, they don't have the best of intentions, but Google has some handy tools to address that, and they've gotten an upgrade today. The "Results About You" tool can now detect and remove more of your personal information. Plus, the tool for removing non-consensual explicit imagery (NCEI) is faster to use. All you have to do is tell Google your personal details first-- that seems safe, right?
With today's upgrade, Results About You gains the ability to find and remove pages that include ID numbers like your passport, driver's license, and Social Security. You can access the option to add these to Google's ongoing scans from the settings in Results About You. Just click in the ID numbers section to enable detection.
Naturally, Google has to know what it's looking for to remove it. So you need to provide at least part of those numbers. Google asks for the full driver's license number, which is fine, as it's not as sensitive. For your passport and SSN, you only need the last 4 digits, which is enough for Google to find the full numbers on webpages.
The NCEI tool is geared toward hiding real, explicit images as well as deepfakes and other types of artificial sexualized content. This kind of content is rampant on the Internet right now due to the rapid rise of AI. What used to require Photoshop skills is now just a prompt away, and some AI platforms hardly do anything to prevent it.
Google has made this tool easier to access and faster to report images. You can access it from the 3-dot menu on any image that appears in Google's search results. Just select remove result and It shows a sexual image of me to begin the removal process. Google will ask if it's a real image or a deepfake. The company has added the option to add multiple images to a single request, which could save a lot of time if someone is using AI to churn out such content.
Sanitizing scans for safer search
Neither Results About You nor the NCEI tool works instantly, and they can't actually remove content from the Internet. But if Google approves the removal request, the content won't appear in its search results, which is almost as good as not appearing on the Internet as far as most people are concerned.
After adding data to Results About You, Google intermittently scans for that data and will email you alerts so you can quickly remove results. That's now an option for the NCII tool, too. If you enable it, Google's system can monitor for new instances of the offending images. Google says it will "proactively filter out" these explicit results for you. This data will be integrated with the Results About You hub so you can see how often they appear.
The ID-number scanning is live in Results About You today. Meanwhile, the updated NCEI reporting will be available in the coming days. It will be available in "most countries" and will expand to more over time.
With today's upgrade, Results About You gains the ability to find and remove pages that include ID numbers like your passport, driver's license, and Social Security. You can access the option to add these to Google's ongoing scans from the settings in Results About You. Just click in the ID numbers section to enable detection.
Naturally, Google has to know what it's looking for to remove it. So you need to provide at least part of those numbers. Google asks for the full driver's license number, which is fine, as it's not as sensitive. For your passport and SSN, you only need the last 4 digits, which is enough for Google to find the full numbers on webpages.
The NCEI tool is geared toward hiding real, explicit images as well as deepfakes and other types of artificial sexualized content. This kind of content is rampant on the Internet right now due to the rapid rise of AI. What used to require Photoshop skills is now just a prompt away, and some AI platforms hardly do anything to prevent it.
Google has made this tool easier to access and faster to report images. You can access it from the 3-dot menu on any image that appears in Google's search results. Just select remove result and It shows a sexual image of me to begin the removal process. Google will ask if it's a real image or a deepfake. The company has added the option to add multiple images to a single request, which could save a lot of time if someone is using AI to churn out such content.
Sanitizing scans for safer search
Neither Results About You nor the NCEI tool works instantly, and they can't actually remove content from the Internet. But if Google approves the removal request, the content won't appear in its search results, which is almost as good as not appearing on the Internet as far as most people are concerned.
After adding data to Results About You, Google intermittently scans for that data and will email you alerts so you can quickly remove results. That's now an option for the NCII tool, too. If you enable it, Google's system can monitor for new instances of the offending images. Google says it will "proactively filter out" these explicit results for you. This data will be integrated with the Results About You hub so you can see how often they appear.
The ID-number scanning is live in Results About You today. Meanwhile, the updated NCEI reporting will be available in the coming days. It will be available in "most countries" and will expand to more over time.
I Used Linux for 8 Years: Here's What They Don't Tell You
Microsoft February 2026 Patch Tuesday fixes 6 Zero-Days, 58 Flaws
By Lawrence Abrams for bleepingcomputer
bleepingcomputer
Today is Microsoft's February 2026 Patch Tuesday with security updates for 58 flaws, including 6 actively exploited and 3 publicly disclosed zero-day vulnerabilities.
This Patch Tuesday also addresses 5 "Critical" vulnerabilities, 3 of which are elevation of privileges flaws and 2 information disclosure flaws.
The number of bugs in each vulnerability category is listed below:
When BleepingComputer reports on Patch Tuesday security updates, we only count those released by Microsoft today. Therefore, the number of flaws does not include 3 Microsoft Edge flaws fixed earlier this month.
As part of these updates, Microsoft has also begun to roll out updated Secure Boot certificates to replace the original 2011 certificates that are expiring in late June 2026.
"With this update, Windows quality updates include a broad set of targeting data that identifies devices and their ability to receive new Secure Boot certificates," explains Microsoft in the Windows 11 update notes.
"Devices will receive the new certificates only after they show sufficient successful update signals, which helps ensures a safe and phased rollout."
To learn more about the non-security updates released today, you can review our dedicated articles on the Windows 11 KB5077181 & KB5075941 cumulative updates and the Windows 10 KB5075912 extended security update.
6 actively exploited zero-days
This month's Patch Tuesday fixes 6 actively exploited vulnerabilities, 3 of which are publicly disclosed.
Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited while no official fix is available.
The 6 actively exploited zero-days are:
CVE-2026-21510 - Windows Shell Security Feature Bypass Vulnerability
Microsoft has patched an actively exploited Windows security feature bypass that can be triggered by opening a specially crafted link or shortcut file.
"To successfully exploit this vulnerability, an attacker must convince a user to open a malicious link or shortcut file." explains Microsoft.
"An attacker could bypass Windows SmartScreen and Windows Shell security prompts by exploiting improper handling in Windows Shell components, allowing attacker‑controlled content to execute without user warning or consent," continued Microsoft.
While Microsoft has not shared further details, it likely allows attackers to bypass the Mark of the Web (MoTW) security warnings.
Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.
CVE-2026-21513 - MSHTML Framework Security Feature Bypass Vulnerability
Microsoft has patched an actively exploited MSHTML security feature bypass flaw in Windows.
"Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network," explains Microsoft.
There are no details on how this was exploited.
This flaw was once again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, and Google Threat Intelligence Group.
CVE-2026-21514 - Microsoft Word Security Feature Bypass Vulnerability
Microsoft has patched a security feature bypass flaw in Microsoft Word that is actively exploited.
"An attacker must send a user a malicious Office file and convince them to open it," warns Microsoft's advisory.
"This update addresses a vulnerability that bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE control," continues Microsoft.
Microsoft says that the flaw cannot be exploited in the Office Preview Pane.
The flaw was again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.
As no details have been released, it is unclear if CVE-2026-21510, CVE-2026-21513, and CVE-2026-21514 were exploited in the same campaign.
CVE-2026-21519 - Desktop Window Manager Elevation of Privilege Vulnerability
Microsoft has patched an actively exploited elevation of privileges flaw in the Desktop Window Manager.
"An attacker who successfully exploited this vulnerability could gain SYSTEM privileges," warns Microsoft.
No details have been shared on how it was exploited.
Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC) & Microsoft Security Response Center (MSRC).
CVE-2026-21525 - Windows Remote Access Connection Manager Denial of Service Vulnerability
Microsoft fixed an actively exploited denial of service flaw in the Windows Remote Access Connection Manager.
"Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally," explains Microsoft.
No details have been shared on why or how this flaw was exploited in attacks.
Microsoft has attributed the discovery of the flaw to the 0patch vulnerability research team.
CVE-2026-21533 - Windows Remote Desktop Services Elevation of Privilege Vulnerability
Microsoft has fixed an elevation of privileges in Windows Remote Desktop Services.
"Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally," explains Microsoft.
No details have been shared on how this flaw was exploited.
Microsoft has attributed the discovery of the flaw to the Advanced Research Team at CrowdStrike.
Of the 6 zero-days, CVE-2026-21513, CVE-2026-21510, and CVE-2026-21514 were publicly disclosed.
Recent updates from other companies
Other vendors who released updates or advisories in February 2026 include:
While not a security update, Microsoft has started rolling out built-in Sysmon functionality in Windows 11 insider builds, which many Windows admins will find useful.
The February 2026 Patch Tuesday Security Updates
Below is the complete list of resolved vulnerabilities in the February 2026 Patch Tuesday updates.
To access the full description of each vulnerability and the systems it affects, you can view the full report here.
This Patch Tuesday also addresses 5 "Critical" vulnerabilities, 3 of which are elevation of privileges flaws and 2 information disclosure flaws.
The number of bugs in each vulnerability category is listed below:
- 25 Elevation of Privilege vulnerabilities
- 5 Security Feature Bypass vulnerabilities
- 12 Remote Code Execution vulnerabilities
- 6 Information Disclosure vulnerabilities
- 3 Denial of Service vulnerabilities
- 7 Spoofing vulnerabilities
When BleepingComputer reports on Patch Tuesday security updates, we only count those released by Microsoft today. Therefore, the number of flaws does not include 3 Microsoft Edge flaws fixed earlier this month.
As part of these updates, Microsoft has also begun to roll out updated Secure Boot certificates to replace the original 2011 certificates that are expiring in late June 2026.
"With this update, Windows quality updates include a broad set of targeting data that identifies devices and their ability to receive new Secure Boot certificates," explains Microsoft in the Windows 11 update notes.
"Devices will receive the new certificates only after they show sufficient successful update signals, which helps ensures a safe and phased rollout."
To learn more about the non-security updates released today, you can review our dedicated articles on the Windows 11 KB5077181 & KB5075941 cumulative updates and the Windows 10 KB5075912 extended security update.
6 actively exploited zero-days
This month's Patch Tuesday fixes 6 actively exploited vulnerabilities, 3 of which are publicly disclosed.
Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited while no official fix is available.
The 6 actively exploited zero-days are:
CVE-2026-21510 - Windows Shell Security Feature Bypass Vulnerability
Microsoft has patched an actively exploited Windows security feature bypass that can be triggered by opening a specially crafted link or shortcut file.
"To successfully exploit this vulnerability, an attacker must convince a user to open a malicious link or shortcut file." explains Microsoft.
"An attacker could bypass Windows SmartScreen and Windows Shell security prompts by exploiting improper handling in Windows Shell components, allowing attacker‑controlled content to execute without user warning or consent," continued Microsoft.
While Microsoft has not shared further details, it likely allows attackers to bypass the Mark of the Web (MoTW) security warnings.
Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.
CVE-2026-21513 - MSHTML Framework Security Feature Bypass Vulnerability
Microsoft has patched an actively exploited MSHTML security feature bypass flaw in Windows.
"Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network," explains Microsoft.
There are no details on how this was exploited.
This flaw was once again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, and Google Threat Intelligence Group.
CVE-2026-21514 - Microsoft Word Security Feature Bypass Vulnerability
Microsoft has patched a security feature bypass flaw in Microsoft Word that is actively exploited.
"An attacker must send a user a malicious Office file and convince them to open it," warns Microsoft's advisory.
"This update addresses a vulnerability that bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE control," continues Microsoft.
Microsoft says that the flaw cannot be exploited in the Office Preview Pane.
The flaw was again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.
As no details have been released, it is unclear if CVE-2026-21510, CVE-2026-21513, and CVE-2026-21514 were exploited in the same campaign.
CVE-2026-21519 - Desktop Window Manager Elevation of Privilege Vulnerability
Microsoft has patched an actively exploited elevation of privileges flaw in the Desktop Window Manager.
"An attacker who successfully exploited this vulnerability could gain SYSTEM privileges," warns Microsoft.
No details have been shared on how it was exploited.
Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC) & Microsoft Security Response Center (MSRC).
CVE-2026-21525 - Windows Remote Access Connection Manager Denial of Service Vulnerability
Microsoft fixed an actively exploited denial of service flaw in the Windows Remote Access Connection Manager.
"Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally," explains Microsoft.
No details have been shared on why or how this flaw was exploited in attacks.
Microsoft has attributed the discovery of the flaw to the 0patch vulnerability research team.
CVE-2026-21533 - Windows Remote Desktop Services Elevation of Privilege Vulnerability
Microsoft has fixed an elevation of privileges in Windows Remote Desktop Services.
"Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally," explains Microsoft.
No details have been shared on how this flaw was exploited.
Microsoft has attributed the discovery of the flaw to the Advanced Research Team at CrowdStrike.
Of the 6 zero-days, CVE-2026-21513, CVE-2026-21510, and CVE-2026-21514 were publicly disclosed.
Recent updates from other companies
Other vendors who released updates or advisories in February 2026 include:
- Adobe released security updates for Audition, After Effects, InDesign, Substance 3D, Adobe Lightroom Classic, and other software. None of the flaws are exploited.
- BeyondTrust released security updates for a critical RCE flaw in its Remote Support (RS) and Privileged Remote Access (PRA) software.
- CISA issued a new binding operational directive requiring federal agencies to remove network edge devices that have reached the end of support.
- Cisco released security updates for Secure Web Appliance, Cisco Meeting Management, and more.
- Fortinet released security updates for FortiOS and FortiSandbox.
- Google has released Android's February security bulletin, which includes no security fixes.
- n8n fixed critical vulnerabilities that act as a patch bypass for the previously fixed CVE-2025-68613 RCE flaw.
- SAP released the February security updates for multiple products, including fixes for 2 critical vulnerabilities.
While not a security update, Microsoft has started rolling out built-in Sysmon functionality in Windows 11 insider builds, which many Windows admins will find useful.
The February 2026 Patch Tuesday Security Updates
Below is the complete list of resolved vulnerabilities in the February 2026 Patch Tuesday updates.
To access the full description of each vulnerability and the systems it affects, you can view the full report here.
Al Agents Communicating with Each Other just Revealed
the Actual Problem
Age Verification is Coming to Discord, and it Looks like a Privacy Nightmare
By Dave Schafer for Make Use Of
Credit: Diego Thomazini/Shutterstock
Today, Discord announced new safety features designed to help safeguard younger users. This is a noble undertaking. Unfortunately, the methods the company plans to use have raised some serious privacy concerns and sparked backlash on online platforms like Reddit.
How Discord's age verification will work - Goodbye, privacy
Once these updated safety measures roll out, all Discord accounts will be updated to the new default settings. Essentially, every account will default to a teen profile that filters out certain content until your age is verified. The new safety defaults will include:
In order to remove these restrictions, you'll need to verify your age. There will be 2 options available: facial age estimation-- using a video selfie-- or submitting identification to a Discord vendor partner. The company claims more options will be coming in the future.
Discord also says it'll use what it's calling an "age inference model." This is a new system that runs in the background and tries to guess whether your account belongs to an adult. The advantage of this is that you may not need to use one of the age verification methods mentioned above. Obviously, the disadvantage is that your activity is being scanned to determine your age.
What security measures are in place? - Discord's track record doesn't inspire confidence
For its part, Discord says it'll take your privacy seriously. The company outlined the following privacy measures:
These privacy measures are good to see, because the company doesn't have the best track record in this area. Discord's vendors have been involved in several data breaches over the years, and the company appears to be using 3rd-party vendors as part of this age verification process. This doesn't exactly inspire confidence.
The most recent incident occurred toward the end of 2025 and, concerningly, included government-issued IDs used for age verification. This sort of thing is why we don't like providing IDs online.
Users are not happy
Discord users took to Reddit to voice their frustrations. Some stated flatly that they would not be participating.
How Discord's age verification will work - Goodbye, privacy
Once these updated safety measures roll out, all Discord accounts will be updated to the new default settings. Essentially, every account will default to a teen profile that filters out certain content until your age is verified. The new safety defaults will include:
- Content filters that blur sensitive content.
- Age-gated spaces that only allow access to adults.
- A separate inbox for direct messages from people you don't know.
- Warning prompts for friend requests from other users you may not know.
- Restrictions on the ability to speak on stage in servers.
In order to remove these restrictions, you'll need to verify your age. There will be 2 options available: facial age estimation-- using a video selfie-- or submitting identification to a Discord vendor partner. The company claims more options will be coming in the future.
Discord also says it'll use what it's calling an "age inference model." This is a new system that runs in the background and tries to guess whether your account belongs to an adult. The advantage of this is that you may not need to use one of the age verification methods mentioned above. Obviously, the disadvantage is that your activity is being scanned to determine your age.
What security measures are in place? - Discord's track record doesn't inspire confidence
For its part, Discord says it'll take your privacy seriously. The company outlined the following privacy measures:
- Verified on-device: Discord says the selfies you take for verification never leave your device.
- Quick removal of personal data: The company claims any documents submitted to vendor partners are deleted "quickly." That's a vague word, but Discord says in most cases the documents should be deleted immediately after age confirmation.
- One-time verification: Discord claims that you'll generally only need to verify once, and then the platform will adapt to your verified age group. You might be asked to use more than one method if Discord feels more info is needed, however.
- Private status: Discord says your age verification status is never visible to other users.
These privacy measures are good to see, because the company doesn't have the best track record in this area. Discord's vendors have been involved in several data breaches over the years, and the company appears to be using 3rd-party vendors as part of this age verification process. This doesn't exactly inspire confidence.
The most recent incident occurred toward the end of 2025 and, concerningly, included government-issued IDs used for age verification. This sort of thing is why we don't like providing IDs online.
Users are not happy
Discord users took to Reddit to voice their frustrations. Some stated flatly that they would not be participating.
User Blowback convinces Adobe to keep Supporting 30-year-old
2D Animation app
By Scharon Harding for Ars Technica
Despite the about-face, some customers think "the damage is done."
Despite the about-face, some customers think "the damage is done."
The Adobe headquarters in San Jose, California, US, on Tuesday, June 3, 2025. Credit: David Paul Morris/Bloomberg via Getty Images
Adobe has canceled plans to discontinue its 2D animation software Animate.
On Monday, Adobe announced that it would stop allowing people to sell subscriptions to Animate on March 1, saying the software had "served its purpose." People who already had a software license would be able to keep using Animate with technical support until March 1, 2027; businesses had until March 1, 2029. Per an email sent to customers, Adobe also said users would lose access to Animate files and project data on March 1, 2027. Animate costs $23 per month.
After receiving backlash from animators and other users, Adobe reversed its decision on Tuesday night. In an announcement posted online, the San Jose, California-headquartered company said:
"We are not discontinuing or removing access to Adobe Animate. Animate will continue to be available for both current and new customers, and we will ensure you continue to have access to your content. There is no longer a deadline or date by which Animate will no longer be available."
Adobe said the software will be available for individuals and businesses and will still receive technical support and security and bug fixes, but not new features.
The company said its Monday announcement "did not meet our standards and caused a lot of confusion and angst."
"We are committed to ensuring Animate users have access to their content regardless if the state of development changes," Adobe said.
Mike Chambers, a community director at Adobe, affirmed via Reddit that Adobe has no plans to shut down Animate. If the company decides to discontinue the software, it "will work closely with the community to ensure they have adequate time to plan in order to minimize disruption and will take steps so that the community continues to have long-term access to their content," he said.
30 years of animation
Animate debuted in 1996 as FutureWave Software's FutureSplash Animator. After a 1997 acquisition by Macromedia, FutureSplash Animator became Macromedia Flash. In 2005, Adobe bought Macromedia and renamed Macromedia Flash to Adobe Flash Professional. In 2015, the software became Adobe Animate CC. In its nearly 30 years of use, Animate has been used in numerous popular animated films and shows, including Star Trek: Lower Decks. Still, Adobe said on Monday that "new platforms and paradigms have emerged that better serve the needs of the user."
Based on the response to Monday's announcement, not everyone agrees that Animate is obsolete. Adobe's announcement has also drawn increased scrutiny because of the company's growing focus on AI-based tools, which have led to higher subscription fees.
"Shutting down Animate and cutting off users from decades worth of work, while simultaneously focusing on anti-artist AI technology, is incredibly disrespectful to your users. Make the software open-source if you're not going to do the work yourself," a user on Adobe's forum going by "FFFlay" wrote in response to Monday's announcement.
Although Adobe has shown an ability to respond to customer frustration and will allow people to use Animate for the foreseeable future, people who depend on the software, including for animation and education, are concerned about relying on a program that Adobe almost discontinued.
In a post today, an Adobe community member going by the username rayek.elfin wrote, "The damage is done in my opinion. The news of Adobe discontinuing Animate went viral and probably created so much anxiety and uncertainty that studios and indie animators are already looking to replace Animate in their pipelines."
When asked how Adobe will try to rebuild trust among users, Chambers said, "Trust doesn't come beforehand, it comes after-- and has to be earned. We say what we will do, and if we consistently do it, we gain trust. We are at the 'we say what we will do' part for a lot of people."
On Monday, Adobe announced that it would stop allowing people to sell subscriptions to Animate on March 1, saying the software had "served its purpose." People who already had a software license would be able to keep using Animate with technical support until March 1, 2027; businesses had until March 1, 2029. Per an email sent to customers, Adobe also said users would lose access to Animate files and project data on March 1, 2027. Animate costs $23 per month.
After receiving backlash from animators and other users, Adobe reversed its decision on Tuesday night. In an announcement posted online, the San Jose, California-headquartered company said:
"We are not discontinuing or removing access to Adobe Animate. Animate will continue to be available for both current and new customers, and we will ensure you continue to have access to your content. There is no longer a deadline or date by which Animate will no longer be available."
Adobe said the software will be available for individuals and businesses and will still receive technical support and security and bug fixes, but not new features.
The company said its Monday announcement "did not meet our standards and caused a lot of confusion and angst."
"We are committed to ensuring Animate users have access to their content regardless if the state of development changes," Adobe said.
Mike Chambers, a community director at Adobe, affirmed via Reddit that Adobe has no plans to shut down Animate. If the company decides to discontinue the software, it "will work closely with the community to ensure they have adequate time to plan in order to minimize disruption and will take steps so that the community continues to have long-term access to their content," he said.
30 years of animation
Animate debuted in 1996 as FutureWave Software's FutureSplash Animator. After a 1997 acquisition by Macromedia, FutureSplash Animator became Macromedia Flash. In 2005, Adobe bought Macromedia and renamed Macromedia Flash to Adobe Flash Professional. In 2015, the software became Adobe Animate CC. In its nearly 30 years of use, Animate has been used in numerous popular animated films and shows, including Star Trek: Lower Decks. Still, Adobe said on Monday that "new platforms and paradigms have emerged that better serve the needs of the user."
Based on the response to Monday's announcement, not everyone agrees that Animate is obsolete. Adobe's announcement has also drawn increased scrutiny because of the company's growing focus on AI-based tools, which have led to higher subscription fees.
"Shutting down Animate and cutting off users from decades worth of work, while simultaneously focusing on anti-artist AI technology, is incredibly disrespectful to your users. Make the software open-source if you're not going to do the work yourself," a user on Adobe's forum going by "FFFlay" wrote in response to Monday's announcement.
Although Adobe has shown an ability to respond to customer frustration and will allow people to use Animate for the foreseeable future, people who depend on the software, including for animation and education, are concerned about relying on a program that Adobe almost discontinued.
In a post today, an Adobe community member going by the username rayek.elfin wrote, "The damage is done in my opinion. The news of Adobe discontinuing Animate went viral and probably created so much anxiety and uncertainty that studios and indie animators are already looking to replace Animate in their pipelines."
When asked how Adobe will try to rebuild trust among users, Chambers said, "Trust doesn't come beforehand, it comes after-- and has to be earned. We say what we will do, and if we consistently do it, we gain trust. We are at the 'we say what we will do' part for a lot of people."
Foxit Releases Security Updates for PDF Editor Cloud XSS Vulnerabilities
By Ashish Khaitan for The Cyber Express
The Cyber Express
Foxit Software has released security updates addressing multiple cross-site scripting (XSS) vulnerabilities affecting Foxit PDF Editor Cloud and Foxit eSign, closing gaps that could have allowed attackers to execute arbitrary JavaScript within a user's browser. The patches were issued as part of Foxit's ongoing security and stability improvements, with the most recent update for Foxit PDF Editor Cloud released on February 3, 2026.
The vulnerabilities stem from weaknesses in input validation and output encoding within specific features of Foxit PDF Editor Cloud. According to Foxit's official advisory, attackers could exploit these flaws when users interacted with specially crafted file attachments or manipulated layer names inside PDF documents. In such cases, untrusted input could be embedded directly into the application's HTML structure without proper sanitization, enabling malicious script execution.
The advisory states that the update includes security and stability improvements, and that no manual action is required beyond ensuring the software is up to date.
Details of Foxit PDF Editor Vulnerabilities CVE-2026-1591 and CVE-2026-1592
Two vulnerabilities were identified in Foxit PDF Editor Cloud: CVE-2026-1591 and CVE-2026-1592. Both issues fall under Cross-Site Scripting (CWE-79) and carry a Moderate severity rating, with a CVSS v3.0 score of 6.3. The vulnerabilities affect the File Attachments list and Layers panel, where attackers could inject crafted payloads into file names or layer names.
CVE-2026-1591, considered the primary issue, allows attackers to exploit insufficient input validation and improper output encoding to execute arbitrary JavaScript in a user's browser. CVE-2026-1592 presents the same risk through similar attack vectors and conditions. Both vulnerabilities were discovered and reported by security researcher Novee.
Although exploitation requires user interaction, the impact can be significant. Attackers must convince authenticated users to access specially crafted attachments or layer configurations. Once triggered, the malicious JavaScript runs within the browser context, potentially enabling session hijacking, exposure of sensitive data from open PDF documents, or redirection to attacker-controlled websites.
Enterprise Risk and Attack Surface Considerations
The attack surface is particularly relevant in enterprise environments where Foxit PDF Editor is widely used for document collaboration and editing. Employees often handle PDFs originating from external partners, customers, or public sources, increasing the likelihood of exposure to crafted payloads.
In addition to Foxit PDF Editor Cloud, Foxit also addressed a related XSS vulnerability affecting Foxit eSign, tracked as CVE-2025-66523. This flaw carries a CVSS score of 6.1 and occurs due to improper handling of URL parameters in specially crafted links.
When authenticated users visit these links, untrusted input may be embedded into JavaScript code and HTML attributes without adequate encoding, creating opportunities for privilege escalation and cross-domain data theft. The patch for Foxit eSign was released on January 15, 2026.
Patches, Mitigation, and Security Guidance
Foxit confirmed that CVE-2026-1591, CVE-2026-1592, and CVE-2025-66523 have all been fully patched. The fixes include improved input validation and output encoding mechanisms designed to prevent malicious script injection. Updates for Foxit PDF Editor Cloud are deployed automatically or available through standard update mechanisms, requiring no additional configuration.
Organizations using Foxit PDF Editor Cloud and Foxit eSign should confirm that their systems are running the latest versions. Administrators are also advised to monitor for unusual JavaScript execution, unexpected PDF editor behavior, or anomalies in application logs.
For environments handling sensitive documents, additional controls may help reduce risk. These include limiting PDF editing to trusted networks, enforcing browser-based content security policies, and restricting access to untrusted attachments. End users should remain cautious when opening PDF files from unknown sources and avoid clicking suspicious links within eSign workflows.
The vulnerabilities stem from weaknesses in input validation and output encoding within specific features of Foxit PDF Editor Cloud. According to Foxit's official advisory, attackers could exploit these flaws when users interacted with specially crafted file attachments or manipulated layer names inside PDF documents. In such cases, untrusted input could be embedded directly into the application's HTML structure without proper sanitization, enabling malicious script execution.
The advisory states that the update includes security and stability improvements, and that no manual action is required beyond ensuring the software is up to date.
Details of Foxit PDF Editor Vulnerabilities CVE-2026-1591 and CVE-2026-1592
Two vulnerabilities were identified in Foxit PDF Editor Cloud: CVE-2026-1591 and CVE-2026-1592. Both issues fall under Cross-Site Scripting (CWE-79) and carry a Moderate severity rating, with a CVSS v3.0 score of 6.3. The vulnerabilities affect the File Attachments list and Layers panel, where attackers could inject crafted payloads into file names or layer names.
CVE-2026-1591, considered the primary issue, allows attackers to exploit insufficient input validation and improper output encoding to execute arbitrary JavaScript in a user's browser. CVE-2026-1592 presents the same risk through similar attack vectors and conditions. Both vulnerabilities were discovered and reported by security researcher Novee.
Although exploitation requires user interaction, the impact can be significant. Attackers must convince authenticated users to access specially crafted attachments or layer configurations. Once triggered, the malicious JavaScript runs within the browser context, potentially enabling session hijacking, exposure of sensitive data from open PDF documents, or redirection to attacker-controlled websites.
Enterprise Risk and Attack Surface Considerations
The attack surface is particularly relevant in enterprise environments where Foxit PDF Editor is widely used for document collaboration and editing. Employees often handle PDFs originating from external partners, customers, or public sources, increasing the likelihood of exposure to crafted payloads.
In addition to Foxit PDF Editor Cloud, Foxit also addressed a related XSS vulnerability affecting Foxit eSign, tracked as CVE-2025-66523. This flaw carries a CVSS score of 6.1 and occurs due to improper handling of URL parameters in specially crafted links.
When authenticated users visit these links, untrusted input may be embedded into JavaScript code and HTML attributes without adequate encoding, creating opportunities for privilege escalation and cross-domain data theft. The patch for Foxit eSign was released on January 15, 2026.
Patches, Mitigation, and Security Guidance
Foxit confirmed that CVE-2026-1591, CVE-2026-1592, and CVE-2025-66523 have all been fully patched. The fixes include improved input validation and output encoding mechanisms designed to prevent malicious script injection. Updates for Foxit PDF Editor Cloud are deployed automatically or available through standard update mechanisms, requiring no additional configuration.
Organizations using Foxit PDF Editor Cloud and Foxit eSign should confirm that their systems are running the latest versions. Administrators are also advised to monitor for unusual JavaScript execution, unexpected PDF editor behavior, or anomalies in application logs.
For environments handling sensitive documents, additional controls may help reduce risk. These include limiting PDF editing to trusted networks, enforcing browser-based content security policies, and restricting access to untrusted attachments. End users should remain cautious when opening PDF files from unknown sources and avoid clicking suspicious links within eSign workflows.
Docker Fixes critical Ask Gordon AI Flaw allowing Code Execution
via Image Metadata
By Ravie Lakshmanan for The Hacker News
Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could be exploited to execute code and exfiltrate sensitive data.
The critical vulnerability has been codenamed DockerDash by cybersecurity company Noma Labs. It was addressed by Docker with the release of version 4.50.0 in November 2025.
"In DockerDash, a single malicious metadata label in a Docker image can be used to compromise your Docker environment through a simple 3-stage attack: Gordon AI reads and interprets the malicious instruction, forwards it to the MCP-- Model Context Protocol-- Gateway, which then executes it through MCP tools," Sasi Levi, security research lead at Noma, said in a report shared with The Hacker News.
"Every stage happens with zero validation, taking advantage of current agents and MCP Gateway architecture."
Successful exploitation of the vulnerability could result in critical-impact remote code execution for cloud and CLI systems, or high-impact data exfiltration for desktop applications.
The problem, Noma Security said, stems from the fact that the AI assistant treats unverified metadata as executable commands, allowing it to propagate through different layers sans any validation, allowing an attacker to sidestep security boundaries. The result is that a simple AI query opens the door for tool execution.
With MCP acting as a connective tissue between a large language model (LLM) and the local environment, the issue is a failure of contextual trust. The problem has been characterized as a case of Meta-Context Injection.
"MCP Gateway cannot distinguish between informational metadata-- like a standard Docker LABEL-- and a pre-authorized, runnable internal instruction," Levi said. "By embedding malicious instructions in these metadata fields, an attacker can hijack the AI's reasoning process."
In a hypothetical attack scenario, a threat actor can exploit a critical trust boundary violation in how Ask Gordon parses container metadata. To accomplish this, the attacker crafts a malicious Docker image with embedded instructions in Dockerfile LABEL fields.
While the metadata fields may seem innocuous, they become vectors for injection when processed by Ask Gordon AI. The code execution attack chain is as follows:
- The attacker publishes a Docker image containing weaponized LABEL instructions in the Dockerfile
- When a victim queries Ask Gordon AI about the image, Gordon reads the image metadata, including all LABEL fields, taking advantage of Ask Gordon's inability to differentiate between legitimate metadata descriptions and embedded malicious instructions
- Ask Gordon to forward the parsed instructions to the MCP gateway, a middleware layer that sits between AI agents and MCP servers.
- MCP Gateway interprets it as a standard request from a trusted source and invokes the specified MCP tools without any additional validation
- MCP tool executes the command with the victim's Docker privileges, achieving code execution
The data exfiltration vulnerability weaponizes the same prompt injection flaw but takes aim at Ask Gordon's Docker Desktop implementation to capture sensitive internal data about the victim's environment using MCP tools by taking advantage of the assistant's read-only permissions.
The gathered information can include details about installed tools, container details, Docker configuration, mounted directories, and network topology.
It's worth noting that Ask Gordon version 4.50.0 also resolves a prompt injection vulnerability discovered by Pillar Security that could have allowed attackers to hijack the assistant and exfiltrate sensitive data by tampering with the Docker Hub repository metadata with malicious instructions.
"The DockerDash vulnerability underscores your need to treat AI Supply Chain Risk as a current core threat," Levi said. "It proves that your trusted input sources can be used to hide malicious payloads that easily manipulate AI's execution path. Mitigating this new class of attacks requires implementing zero-trust validation on all contextual data provided to the AI model."
Mozilla adds One-Click Option to Disable Generative AI features in Firefox
By Ravie Lakshmanan for The Hacker News
Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence (GenAI) features.
Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence (GenAI) features.
"It provides a single place to block current and future generative AI features in Firefox," Ajit Varma, head of Firefox, said. "You can also review and manage individual AI features if you choose to use them. This lets you use Firefox without AI while we continue to build AI features for those who want them."
Mozilla first announced its plans to integrate AI into Firefox in November 2025, stating it's fully opt-in and that it's incorporating the technology while placing users in the driver's seat.
The new feature is expected to be rolled out with Firefox 148, which is scheduled to be released on February 24, 2026. At the outset, AI controls will allow users to manage the following settings individually:
- Translations
- Alt text in PDFs (adding accessibility descriptions to images in PDF pages)
- AI-enhanced tab grouping (suggestions for related tabs and group names)
- Link previews (show key points before a link is opened)
- AI chatbot in the sidebar (Using well-known chatbots like Anthropic Claude, OpenAI ChatGPT, Microsoft Copilot, Google Gemini, and Le Chat Mistral while navigating the web)
Mozilla said user choice is crucial as more AI features are baked into web browsers, adding that it believes in giving people control regardless of how they feel about the technology.
"If you don't want to use AI features from Firefox at all, you can turn on the Block AI enhancements toggle," Varma said. "When it's toggled on, you won't see pop-ups or reminders to use existing or upcoming AI features."
Last month, Mozilla's new CEO, Anthony Enzor-DeMeo, said the company's focus will be on becoming a trusted software company that gives users agency in how its products work. "Privacy, data use, and AI must be clear and understandable," Enzor-DeMeo said. "Controls must be simple. AI should always be a choice-- something people can easily turn off."
Police are Tracking Your Phone without a Warrant - Here's How
Microsoft Fixes Bug causing Password Sign-in Option to Disappear
By Sergiu Gatlan for bleepingcomputer
bleepingcomputer
Microsoft has fixed a known issue that was causing the password sign-in option to disappear from the lock screen options after installing Windows 11 updates released since August 2025.
The password icon appears on the lock screen only if multiple sign-in options-- e.g., PIN, password, security key, fingerprint-- are available. However, if you use only a password, the icon may not appear because Windows 11 shows the password field by default.
As Microsoft said when it acknowledged this bug in November, users with multiple sign-in options enabled may still not see the password icon if they installed the August 2025 KB5064081 non-security preview update or subsequent updates on Windows 11 24H2 or 25H2 systems.
Despite this, affected users can still sign in with their password, as hovering over the space where the icon should appear reveals the hidden button.
"If you hover over the space where the icon should appear, you'll see that the password button is still available," Microsoft explained at the time. "Select this placeholder to open the password text box and enter your password. After entering your password, you can sign in normally."
Microsoft has now resolved this known issue in the January 2025 KB5074105 optional cumulative update for Windows 11 systems released on Thursday, January 29.
You can install KB5074105 by opening Settings, clicking on Windows Update, selecting 'Check for Updates,' and then clicking the 'Download and install' link. You can also manually install this update after downloading it from the Microsoft Update Catalog.
The password icon appears on the lock screen only if multiple sign-in options-- e.g., PIN, password, security key, fingerprint-- are available. However, if you use only a password, the icon may not appear because Windows 11 shows the password field by default.
As Microsoft said when it acknowledged this bug in November, users with multiple sign-in options enabled may still not see the password icon if they installed the August 2025 KB5064081 non-security preview update or subsequent updates on Windows 11 24H2 or 25H2 systems.
Despite this, affected users can still sign in with their password, as hovering over the space where the icon should appear reveals the hidden button.
"If you hover over the space where the icon should appear, you'll see that the password button is still available," Microsoft explained at the time. "Select this placeholder to open the password text box and enter your password. After entering your password, you can sign in normally."
Microsoft has now resolved this known issue in the January 2025 KB5074105 optional cumulative update for Windows 11 systems released on Thursday, January 29.
You can install KB5074105 by opening Settings, clicking on Windows Update, selecting 'Check for Updates,' and then clicking the 'Download and install' link. You can also manually install this update after downloading it from the Microsoft Update Catalog.
KB5074105 includes 32 changes, including fixes for boot, sign-in, and activation issues. For instance, it fixed a bug that triggered iSCSI boot failures with an "Inaccessible Boot Device" error, and another that caused the system to hang during startup when Windows Boot Manager debugging is enabled.
The same preview update addresses a known issue that caused Explorer.exe to hang during the first login when certain apps were configured as startup apps and fixes an issue in which Windows license migrations could fail during upgrades because the PC couldn't register with the Windows Activation server for its digital license.
In late September 2025, Microsoft fixed another known issue caused by the KB5064081 update that triggered playback interruptions, freezing, or black screens when playing DRM-protected video in Blu-ray/DVD/Digital TV apps.
In the same month, it resolved other issues caused by the August 2025 Windows updates, including severe lag and stuttering affecting NDI streaming software on Windows 10 and Windows 11 devices, and app installation problems for non-admin Windows users due to unexpected User Account Control (UAC) prompts.
KB5074105 includes 32 changes, including fixes for boot, sign-in, and activation issues. For instance, it fixed a bug that triggered iSCSI boot failures with an "Inaccessible Boot Device" error, and another that caused the system to hang during startup when Windows Boot Manager debugging is enabled.
The same preview update addresses a known issue that caused Explorer.exe to hang during the first login when certain apps were configured as startup apps and fixes an issue in which Windows license migrations could fail during upgrades because the PC couldn't register with the Windows Activation server for its digital license.
In late September 2025, Microsoft fixed another known issue caused by the KB5064081 update that triggered playback interruptions, freezing, or black screens when playing DRM-protected video in Blu-ray/DVD/Digital TV apps.
In the same month, it resolved other issues caused by the August 2025 Windows updates, including severe lag and stuttering affecting NDI streaming software on Windows 10 and Windows 11 devices, and app installation problems for non-admin Windows users due to unexpected User Account Control (UAC) prompts.
Free Programs are Not Always What They Seem
New Apple Privacy feature Limits Location Tracking on iPhones, iPads
By Sergiu Gatlan for bleepingcomputer
bleepingcomputer
Apple is introducing a new privacy feature that lets users limit the precision of location data shared with cellular networks on some iPhone and iPad models.
The "Limit Precise Location" setting will be available after upgrading to iOS 26.3 or later, and it works by restricting the information mobile carriers use to determine device locations via cell tower connections. When enabled, cellular networks can only identify the device's approximate location, such as a neighborhood, rather than a precise street address.
"The limit precise location setting doesn't impact the precision of the location data that is shared with emergency responders during an emergency call," Apple said.
"This setting affects only the location data available to cellular networks. It doesn't impact the location data that you share with apps through Location Services. For example, it has no impact on sharing your location with friends and family with Find My."
Users can enable the feature by opening Settings, tapping Cellular, then Cellular Data Options, and toggling the Limit Precise Location setting. After enabling limited precise location, the system may prompt a device restart to complete activation.
The privacy enhancement feature currently works only on iPhone Air, iPhone 16e, and iPad Pro (M5) Wi-Fi + Cellular models running iOS 26.3 or later.
Availability depends on carrier support, and currently supported mobile networks include Telekom in Germany, EE and BT in the United Kingdom, Boost Mobile in the United States, and AIS and True in Thailand.
While Apple has yet to share why it's introducing this feature, the Federal Communications Commission (FCC) fined the largest US wireless carriers almost $200 million in April 2024.
The list of fines includes $80 million for T-Mobil and $12 million for Sprint-- which have since merged-- more than $57 million for AT&T, and nearly $47 million for Verizon.
Since cellular networks can easily track device locations via tower connections for network operations, Apple's new privacy feature-- currently supported by only a small number of networks-- is a big step towards ensuring that carriers can collect only limited data on their customers' movements and habits.
The "Limit Precise Location" setting will be available after upgrading to iOS 26.3 or later, and it works by restricting the information mobile carriers use to determine device locations via cell tower connections. When enabled, cellular networks can only identify the device's approximate location, such as a neighborhood, rather than a precise street address.
"The limit precise location setting doesn't impact the precision of the location data that is shared with emergency responders during an emergency call," Apple said.
"This setting affects only the location data available to cellular networks. It doesn't impact the location data that you share with apps through Location Services. For example, it has no impact on sharing your location with friends and family with Find My."
Users can enable the feature by opening Settings, tapping Cellular, then Cellular Data Options, and toggling the Limit Precise Location setting. After enabling limited precise location, the system may prompt a device restart to complete activation.
The privacy enhancement feature currently works only on iPhone Air, iPhone 16e, and iPad Pro (M5) Wi-Fi + Cellular models running iOS 26.3 or later.
Availability depends on carrier support, and currently supported mobile networks include Telekom in Germany, EE and BT in the United Kingdom, Boost Mobile in the United States, and AIS and True in Thailand.
While Apple has yet to share why it's introducing this feature, the Federal Communications Commission (FCC) fined the largest US wireless carriers almost $200 million in April 2024.
The list of fines includes $80 million for T-Mobil and $12 million for Sprint-- which have since merged-- more than $57 million for AT&T, and nearly $47 million for Verizon.
Since cellular networks can easily track device locations via tower connections for network operations, Apple's new privacy feature-- currently supported by only a small number of networks-- is a big step towards ensuring that carriers can collect only limited data on their customers' movements and habits.
Unexpected Authenticator Alerts: Annoying, Scary, or Harmless?
You're Using the Wrong Cable for your Soundbar and it's Killing
the Audio Quality
By Jack Mitchell for Make Use Of
Make Use Of
Your soundbar should always sound better than a flat-panel TV's built-in speakers, but I'm willing to bet it's not working at its peak potential. If your audio still feels flat, compressed, or underwhelming, instead of bigger, clearer, and more cinematic, the issue might not be your speaker at all, but the cable that connects it.
Plenty of people I know still rely on optical-- TOSLINK-- audio cables for their soundbars. This is perfectly understandable, as for years it was the standard for soundbar connections, and many TVs still feature an optical port. However, technology has moved on. Now that streaming services deliver immersive audio formats like Dolby Atmos and DTS:X an optical connection becomes congested with all that extra data. The answer? Opt for an HDMI ARC-- or eARC-- connection and prepare to be amazed at the difference it makes.
Optical audio is a dying format - TOSLINK cables physically can't carry modern surround formats
Plenty of people I know still rely on optical-- TOSLINK-- audio cables for their soundbars. This is perfectly understandable, as for years it was the standard for soundbar connections, and many TVs still feature an optical port. However, technology has moved on. Now that streaming services deliver immersive audio formats like Dolby Atmos and DTS:X an optical connection becomes congested with all that extra data. The answer? Opt for an HDMI ARC-- or eARC-- connection and prepare to be amazed at the difference it makes.
Optical audio is a dying format - TOSLINK cables physically can't carry modern surround formats
Digital connectivity is continually expanding, and as devices and services become more advanced, they require more bandwidth to function. Optical cables were designed decades ago, when stereo and basic surround sound were the standard. As a result, the most they can handle is compressed 5.1 formats like Dolby Digital and DTS.
Even when delivered in compressed formats, modern streaming services like Netflix, Disney+, and Prime Video rely on Dolby Atmos metadata. Optical simply cannot pass this much information, so what does your TV do? It downmixes your audio to a simpler format, so even though your soundbar supports Atmos, it isn't delivering the goods.
HDMI ARC carries more data and better audio - One cable that fully unlocks all your soundbar's features
HDMI ARC-- Audio Return Channel-- was designed to address this problem. Unlike optical, it can carry higher-bandwidth audio formats, including Dolby Digital Plus, which most streaming services use for Atmos. You can go one better with HDMI eARC, which is available on newer TVs and soundbars. This offers a larger bandwidth and supports uncompressed formats such as Dolby TrueHD and DTS:X.
If your TV and soundbar both support ARC (or eARC), then you're all set-- prepare to experience full immersive sound in all its glory. However, there's more to this than just improved sound quality. Switching to HDMI ARC improves the overall experience by supporting automatic lip-sync correction, helping prevent the annoying delay between dialogue and actors' mouths. It also supports HDMI-CEC, so your TV remote can control your soundbar's volume and power, keeping your coffee table clutter-free. Compared to optical's simple audio conduit, these features are a real game-changer.
Some say, 'If it ain't broke, don't fix it' - The argument that optical is more reliable and just works
There are plenty of folks who say optical cables work just fine, and, to be fair, they do have a reputation for reliability. As a guitarist who uses quarter-inch jack connectors invented in 1877, I understand this mentality. Optical is simple, immune to electrical interference, and there's usually no setup headaches.
HDMI ARC, on the other hand, can sometimes be finicky. CEC connectivity can fail, settings can be overly complicated, and brand compatibility isn't always straightforward. Users who primarily watch cable TV and older content and want their soundbar to deliver sound with minimal fuss might feel that optical is the safer choice. Additionally, compared with a TV's built-in speakers, any soundbar is a significant upgrade in audio quality, which may be sufficient for casual users.
Reliability isn't worth sacrificing performance - A few minutes of setup unlocks years of better sound
While it may require a little extra effort to get an HDMI ARC setup all singing and dancing, as long as it's configured correctly, it's no less stable than optical, and the payoff is significant. Not only are you getting much higher-quality audio, better format support, improved vocal syncing, and easier control, but you are also future-proofing your system for future developments that require higher bandwidth.
Content is constantly evolving, and it's increasingly essential to move with the times. With streaming, gaming, and physical media now built around HDMI audio standards, sticking with optical is like choosing compatibility with the past rather than the present. Perhaps most importantly, if you paid for a soundbar that provides Dolby Atmos or advanced surround sound, you deserve to get your money's worth. For the relatively small price of a cable, it should be an easy decision.
Switching to HDMI ARC could be the easiest audio upgrade you ever made
The simple truth is that, while optical audio isn't bad-- after all, anything is better than your TV's built-in speakers-- it is outdated. Modern surround sound formats and immersive audio require a broader bandwidth, and HDMI ARC and, in particular, eARC were created to meet this demand.
If your soundbar supports HDMI ARC and your TV has the port, there's no good reason not to use it. One cable swap can unlock better sound quality, better features, and improved functionality. Before you blame your soundbar, check the cable. If you find yourself regretting buying a soundbar, chances are this relatively inexpensive piece of tech could make all the difference.
© vocalbits.com