disclosure

AppWizard
January 31, 2026
Alistair McFarlane, head of Facepunch Studios, has expressed interest in reviving the canceled Amazon MMO, New World, and has made a light-hearted offer for its rights. He is entering a non-disclosure agreement with an unnamed company, urging fans to keep "low expectations." McFarlane engaged with the New World community by jokingly tagging Amazon Games and discussing the planned shutdown of the New World: Aeternum servers in January 2027. He believes in empowering the community through public server hosting if a deal occurs. McFarlane has acknowledged the game's rough start and lack of long-term support but sees potential for its revival. Facepunch Studios prioritizes community engagement, as demonstrated by the ongoing success of their game Rust. The identity of the unnamed company remains undisclosed, but speculation points to Amazon Games. McFarlane emphasizes that discussions are confidential and that there are no confirmed deals or announcements at this time.
Tech Optimizer
January 27, 2026
The term “not a virus” is used by antivirus software to indicate that a file does not match known malware signatures but still triggers a detection. This means the file is not automatically blocked or confirmed as a threat; the alert highlights something unusual, leaving the decision to the user. Alerts typically arise when software exhibits behavior associated with increased risk, despite lacking clear evidence of malicious intent. Malware is specifically designed to inflict harm, while files labeled “not a virus” may perform actions that raise security concerns but are not classified as harmful. Antivirus programs identify threats through signature detection and heuristic behavior-based detection. Legitimate programs, such as system utilities, download managers, and game cheats, can inadvertently trigger “not a virus” alerts. Common types of detections include adware, riskware, and potentially unwanted applications (PUA). The primary security risk of “not a virus” files is exposure rather than direct attacks, and privacy concerns often arise from data collection by these programs. If an antivirus detects “not a virus,” users should identify the file, review recent changes, compare detections, and decide whether to keep or remove it. To reduce unwanted alerts, users should download from official sources, use custom installation options, and remove unused software.
AppWizard
January 26, 2026
Your Android device can be customized to enhance lifestyle and productivity through various applications. 1. ScreenCraft: Offers high-quality wallpapers, customizable clocks, and home screen setups for personalization. 2. AkiFlow: A productivity assistant that integrates with platforms like Gmail and Google Calendar, featuring task management and smart scheduling. 3. Typy AI: An AI-powered keyboard assistant providing grammar correction, sentence rephrasing, language translation, and tone adjustment. 4. Yin Yang Launcher: A minimalist launcher that prioritizes essential apps and includes a digital well-being tracker for screen time monitoring. 5. Adaptive Theme: Automatically adjusts display settings between light and dark modes based on the environment to reduce eye strain. 6. Volume Scroll: Allows navigation through the volume buttons for easier one-handed use, customizable for specific apps. 7. Weblo: A privacy-centric browser that blocks ads and trackers, supports background audio playback, and enables quick access to web apps. 8. OmniTools: An all-in-one utility app that includes calculators, unit converters, focus timers, and health trackers for everyday needs.
Winsage
January 19, 2026
Microsoft is enhancing its Windows Backup for Organizations by introducing a 'second chance' restore option for Windows 11 users, allowing them to recover Microsoft Store apps and personalized settings at the first sign-in. This feature aims to streamline transitions by preserving Start menu pins and installed Microsoft Store applications, minimizing disruptions during upgrades. Currently in private preview, it is set to officially launch in early 2026. Organizations can sign up for the private preview until February 13, 2026, but must be part of the Microsoft Management Customer Connection Program and have a signed non-disclosure agreement (NDA) to qualify.
Winsage
January 19, 2026
Microsoft released its first set of security updates for the Windows operating system and various products in January 2026, addressing over 110 vulnerabilities. The updates are available for all supported versions of Windows, with Windows 10 receiving fixes only through the Extended Security Updates (ESU) program. Windows 11 versions 24H2 and 25H2 are the main consumer releases benefiting from these updates. Approximately 112–114 security updates were released, with around 8 rated as Critical. At least one zero-day vulnerability is actively exploited. The updates include security fixes for Windows, Office, Edge, Azure, and server components. Windows 11 versions 23H2, 24H2, and 25H2, as well as Windows Server 2023 and 2025, have known issues. Windows 11 version 24H2 and 25H2 received security fixes for multiple vulnerabilities, while version 23H2 continues to receive support through enterprise servicing channels. Windows 10 updates are limited to ESU-enrolled systems, with general support ending in October 2025. Windows Server 2016, 2019, 2022, 2023, and 2025 received January security updates, addressing important vulnerabilities without disclosing any critical ones. Microsoft also released updates for Office products and SharePoint Server components. Known issues after the January updates include credential prompt failures and authentication issues in Azure Virtual Desktop and Windows 365, particularly affecting the new Windows App. Workarounds involve using the classic Remote Desktop client or the web-based RDP client. Additionally, devices with Secure Launch enabled may experience shutdown and sleep mode failures. Microsoft has provided out-of-band fixes for certain affected systems as of January 18, 2026. Users can manually install updates through the Windows Update feature, and it is recommended to create a full system backup before proceeding with updates.
Winsage
January 19, 2026
Microsoft released its first security updates for 2026 on January Patch Tuesday, addressing over 110 vulnerabilities across Windows, Microsoft Office, Edge, Azure components, and other services. The updates are available for all supported versions of Windows, with Windows 10 receiving security fixes only through the Extended Security Updates (ESU) program. Windows 11 versions 24H2 and 25H2 are the primary consumer releases receiving updates. Key details include: - Approximately 112–114 security updates were released. - Around 8 vulnerabilities are rated Critical. - At least one zero-day vulnerability is actively exploited. - Windows 11 version 24H2 and 25H2 received security fixes for multiple vulnerabilities, including remote code execution and privilege escalation. - Windows 11 version 23H2 (Enterprise & Education) continues to receive cumulative security updates. - Windows 10 updates are limited to ESU-enrolled systems, with no feature updates available. - All supported Windows Server versions received updates, addressing important vulnerabilities. - Known issues include shutdown and sleep mode problems for devices with Secure Launch enabled in Windows 11 23H2. - Microsoft Office updates were also released, including for Excel and Word 2016, and SharePoint Server components. Workarounds for known issues have been provided, and users can manually install updates through Windows Update.
AppWizard
January 17, 2026
Valve has updated the declaration form for game submissions to Steam, emphasizing the need for developers to disclose any AI-generated content that is "consumed by players," including art assets, music, writing, and marketing materials. This change shifts the focus from development tools to the actual content delivered to players. Developers are required to declare AI-generated elements such as artwork, sound, and narrative. Valve has maintained a separate check for games using AI to generate content or code during gameplay, allowing players to report inappropriate content and holding developers responsible for safeguarding against such issues. The update clarifies the use of AI in game development without completely overhauling the previous guidelines.
AppWizard
January 16, 2026
The past year saw a 45% increase in new vulnerabilities targeting Android. By the end of 2024, there are projected to be 2.87 million apps on Google Play, with 66% of American employees using personal smartphones for work. Mobile applications are responsible for 70% of digital interactions, and vulnerabilities in these apps contributed to approximately 40% of data breaches involving personal data in 2023. Effective Android App Vulnerability Scanners analyze app security by identifying insecure local storage, hardcoded credentials, weak cryptography, insecure network configurations, broken authentication flows, and misconfigured components. AI-powered scanners, like AutoSecT, can autonomously generate new scanning protocols quickly, detect zero-day vulnerabilities, automate penetration testing, and operate with near-zero false positives.
Winsage
January 15, 2026
Microsoft and the U.S. government have issued a warning about a vulnerability in Windows, designated CVE-2026-20805, which is currently being exploited. This flaw allows an authorized attacker to leak a memory address from a remote ALPC port, potentially leading to arbitrary code execution. It has a medium severity rating of 5.5 on the CVSS scale. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its Known Exploited Vulnerabilities catalog and requires federal agencies to implement a patch by February 3. Additionally, two other vulnerabilities were acknowledged: CVE-2026-21265, a secure boot certificate expiration bypass with a CVSS rating of 6.4, and CVE-2023-31096, an elevation of privilege flaw affecting third-party Agere Modem drivers, rated at 7.8. Two more vulnerabilities, CVE-2026-20952 (CVSS 7.7) and CVE-2026-20953 (CVSS 7.4), are use-after-free flaws in Office that could allow unauthorized code execution.
Search