user authentication

Winsage
March 19, 2026
Microsoft has decided to abandon plans to integrate Copilot more deeply into Windows 11 following user complaints. Features that would have introduced AI-driven notifications and enhancements are no longer being pursued. The company acknowledged user pain points and is shifting focus towards core stability fixes scheduled for 2026. Additionally, the launch of Windows Recall in 2024 faced privacy issues, leading to a revised version that includes data encryption and user authentication. Microsoft has also allowed administrators on Pro and Enterprise systems to uninstall the Copilot app under certain conditions, reflecting a response to user feedback and past update failures.
AppWizard
December 11, 2025
Android 17 introduces a system app locking feature, enhancing mobile security with a new permission structure called LOCK_APPS, allowing only system apps and designated launchers to execute this functionality. This feature utilizes the Biometric Prompt API for user authentication via fingerprint, facial recognition, or PIN. Users can lock or unlock apps by long-pressing the app icon on the launcher, which sends a SETAPPLOCK request to Android's core security service. The app lock will only be available on handheld devices, excluding Android Automotive, Wear OS, and Android TV. The feature is expected to debut later in the rollout of Android 17, benefiting Xiaomi devices and HyperOS.
Tech Optimizer
October 29, 2025
Oracle has introduced a native Boolean data type in its Oracle Database 23ai, aligning more closely with features in competitors like PostgreSQL. Previously, Oracle developers used numeric values or varchar types to represent true/false logic. The new Boolean type aims to streamline application code and improve compatibility with modern programming languages. This feature comes decades after PostgreSQL integrated native Boolean support, which allows values of true, false, or null and enhances query reliability. PostgreSQL's early adoption of this feature provides it with a competitive edge in scenarios requiring precise conditional logic. Oracle's new Boolean type is intended to facilitate smoother migrations and improve interoperability, addressing challenges faced by users transitioning from PostgreSQL. However, Oracle's implementation is still developing, and users may encounter version-specific behaviors. Tools like HexaRocket from HexaCluster can assist in mapping Boolean types for seamless migrations. Despite the advancements, Oracle users may face backward compatibility issues with legacy applications. The introduction of the native Boolean type reflects broader trends in database innovation and the competitive dynamics between Oracle and open-source alternatives like PostgreSQL.
Winsage
August 11, 2025
Researchers Yair and Shahak Morag from SafeBreach Labs introduced a new category of denial-of-service (DoS) attacks called the “Win-DoS Epidemic” at DEF CON 33. They identified four new vulnerabilities in Windows DoS and one zero-click distributed denial-of-service (DDoS) flaw, classified as “uncontrolled resource consumption.” The vulnerabilities include: - CVE-2025-26673 (CVSS 7.5): High-severity DoS vulnerability in Windows LDAP. - CVE-2025-32724 (CVSS 7.5): High-severity DoS vulnerability in Windows LSASS. - CVE-2025-49716 (CVSS 7.5): High-severity DoS vulnerability in Windows Netlogon. - CVE-2025-49722 (CVSS 5.7): Medium-severity DoS vulnerability in Windows Print Spooler, requiring an authenticated attacker on an adjacent network. These vulnerabilities can incapacitate Windows endpoints or servers, including Domain Controllers (DCs), potentially allowing for the creation of a DDoS botnet. The researchers also discovered a DDoS technique called Win-DDoS that exploits a flaw in the Windows LDAP client’s referral process, enabling attackers to redirect DCs to a victim server for continuous redirection. This method can leverage public DCs globally, creating a large, untraceable DDoS botnet without specialized infrastructure. Additionally, the researchers examined the Remote Procedure Call (RPC) protocol and found three new zero-click, unauthenticated DoS vulnerabilities that can crash any Windows system. They also identified another DoS flaw exploitable by any authenticated user on the network. The researchers released tools named “Win-DoS Epidemic” to exploit these vulnerabilities, highlighting the need for organizations to reassess their security measures regarding internal systems and services like DCs.
AppWizard
July 31, 2025
Google Chrome on Android will soon require biometric verification to autofill passwords, enhancing security by preventing autofill without user authentication. This feature will be available in Google Password Manager and is expected to roll out more widely soon. Currently, Chrome has an option for biometric authentication in its Autofill settings, but this has only applied within apps. The update will extend this requirement to all apps, including Chrome, and will be labeled "Verify it's you" in the settings. Users will need to authenticate their identity through fingerprint, facial recognition, or screen lock before passwords can be autofilled. While an official release date is not yet announced, the feature has started appearing for some users, indicating a potential imminent rollout.
AppWizard
July 8, 2025
A newly identified Android malware family, Qwizzserial, has emerged as a significant threat in Uzbekistan, disguising itself as legitimate financial and government applications. It spreads primarily through Telegram, using deceptive channels to impersonate authorities and financial institutions, luring victims with offers of financial assistance. Upon installation, Qwizzserial requests permissions related to SMS and phone state, prompting users to input sensitive information such as phone numbers and bank card details, which it exfiltrates via the Telegram Bot API or HTTP POST requests. The malware intercepts incoming SMS messages, including one-time passwords (OTPs) for two-factor authentication, and can extract financial information from messages. Analysts from Group-IB have tracked around 100,000 infections linked to Qwizzserial, with confirmed financial losses exceeding ,000,000 within three months. The malware's infection pattern follows a Pareto distribution, with a small subset of samples causing the majority of infections, particularly those impersonating financial institutions. Security solutions have developed detection rules for Qwizzserial, and organizations are encouraged to implement user education and monitoring to mitigate risks. End-users are advised against installing applications from untrusted sources and to scrutinize app permissions. Indicators of Compromise (IOC) include specific C2 domains and file hashes for both example and latest samples of Qwizzserial.
Search