user permissions

Winsage
December 2, 2025
Microsoft has alerted Windows 11 users about a new experimental AI feature called the “Proxy Server,” introduced in build 26220.7262, which can be manually activated in the “AI Components” section. Users receive a cautionary message regarding the feature's experimental nature and potential impacts on device performance, including inaccuracies and unexpected behavior. The underlying language model is still in development, leading to risks of inaccuracies due to incomplete training data. Experts have raised concerns about vulnerabilities to cyber threats, with reports of cybercriminals exploring ways to exploit the AI features. The “Proxy Server” has default read and write permissions to critical user directories, raising security concerns. Microsoft plans to enhance security measures with more granular permission controls and advises that the feature should only be enabled by users aware of the associated risks.
AppWizard
November 13, 2025
Google has launched Gemini tools to enhance holiday shopping with AI assistance, enabling real-time inventory checks and agentic checkout. Users can engage with AI to receive tailored product results, including images, pricing, reviews, and inventory status. The AI can locate products in stock at nearby stores and contact retailers on behalf of users. Additionally, the agentic checkout feature allows users to track specific items and receive notifications for price drops, facilitating purchases directly through Google Pay. These features are currently available in the U.S. as of November 13, with plans for future expansion.
Tech Optimizer
November 7, 2025
A banking trojan named Herodotus targets Android users globally, operating as Malware-as-a-Service and disguising itself as a legitimate app to lure users into downloading an APK from unofficial sources. Once installed, it gains critical system permissions to perform banking operations on behalf of the user. The malware is primarily distributed through SMS phishing campaigns that lead victims to fraudulent download pages. Herodotus employs overlay attacks to steal credentials and hijack sessions, posing a significant threat to financial security. It uses advanced evasion tactics, including random delays and realistic typing patterns, to avoid detection by traditional antivirus solutions. The trojan captures screen content and keystrokes, allowing real-time monitoring of user activity. Detection is complicated as Herodotus circumvents defenses by installing from unknown sources and executing harmful actions only after obtaining user permissions. Effective defense requires recognizing multiple indicators of compromise, such as suspicious SMS links and behavioral anomalies, which traditional antivirus protection often overlooks.
AppWizard
September 2, 2025
Android droppers, originally designed to deploy banking Trojans, are now being repurposed to deliver simpler payloads like SMS stealers and spyware. There has been a notable increase in dropper campaigns, especially in Asia, shifting focus from financial malware to broader data exfiltration and surveillance. These droppers often masquerade as legitimate applications, gaining user permissions to install secondary malware that can read SMS messages, which is critical for hijacking two-factor authentication. Google is enhancing Android security with mandatory developer verifications by 2026, but droppers like SecuriDropper can evade detection through dropper-as-a-service models. Campaigns such as LunaSpy exploit messaging apps to deliver spyware disguised as antivirus software, increasing infection rates. Over 200 banking and cryptocurrency applications are potentially at risk due to these threats. To mitigate these risks, enterprises are encouraged to implement multi-layered defenses and proactive monitoring of app behaviors. The adaptive nature of droppers poses ongoing challenges for mobile security.
Winsage
August 29, 2025
Many users are seeking alternatives to Microsoft due to the upselling of Office 365 and the prevalence of AI features in Windows, with Linux emerging as a popular option. Bazzite is a user-friendly Linux distribution designed for gamers, offering a choice between a KDE variant with a Windows-like interface and a GNOME variant similar to macOS. It aims to replicate the SteamOS experience and has shown commendable performance for gaming, allowing many titles from the Steam library to run smoothly, including System Shock 2 remaster, Pillars of Eternity, The Witcher 3, Hunt: Showdown, Baldur's Gate 3, and Stonks-9800. However, online multiplayer games with strict anti-cheat systems, like Fortnite and Valorant, may not perform well on Linux. HDR support can be inconsistent, but Linux generally manages multi-monitor setups better than Windows.
Winsage
August 22, 2025
The Linux community faces challenges when certain applications are only available on Windows, despite solutions like Wine and virtual machines. A new approach using hardware instead of virtualization has emerged. The author received a Surface Laptop 2 that was non-functional until the keyboard was removed, revealing it was operational. While transitioning Windows installations from VirtualBox to KVM, the author discovered WinApps, a script that allows Windows applications to run on a Linux desktop via a virtual machine. However, this setup caused performance issues due to constant disk activity. The author experimented with connecting WinApps to a physical Windows machine on the network, successfully running Windows software directly on their desktop. The setup required executing an installation script on the Windows machine and making registry changes to enable RDP applications. Minor hurdles included compatibility issues with a dual-monitor setup and user permission bugs. Ultimately, Microsoft Word ran smoothly on the author's KDE desktop, demonstrating the potential for utilizing older computers for occasional tasks.
Winsage
April 25, 2025
In early April 2025, Microsoft addressed a security vulnerability (CVE-2025-21204) related to symbolic links in the Windows servicing stack, specifically affecting the c:inetpub directory used by Internet Information Services (IIS). The updates created the c:inetpub folder with appropriate permissions to mitigate risks. However, this fix introduced a new denial-of-service (DoS) vulnerability, allowing non-administrative users to create junction points on the c: drive, disrupting the Windows Update mechanism. A command such as "mklink /j c:inetpub c:windowssystem32notepad.exe" could be used to exploit this flaw, preventing systems from receiving future security patches. As of April 25, Microsoft had not released a patch or acknowledged the issue, leaving systems vulnerable and emphasizing the need for monitoring user permissions and manually removing suspicious symlinks.
Search