Antivirus

Windows 10 problems are ruining Microsoft’s reputation – and the damage can’t be underestimated

Microsoft dreams of a future where its cloud empire dominates – in the computing and business world, as well as game-streaming – and subscription revenue pours in at such a gushing rate that the accountants can barely keep track of the ever-spiralling-upward numbers.But, the software giant’s current slumbers are more likely to be dogged by…


Microsoft dreams of a future where its cloud empire dominates – in the computing and business world, as well as game-streaming – and subscription revenue pours in at such a gushing rate that the accountants can barely keep track of the ever-spiralling-upward numbers.

But, the software giant’s current slumbers are more likely to be dogged by nightmares rather than any sweet dreams of a heavenly cloud-based future. Microsoft’s sleep is probably haunted by visions of poisonous little bugs skittering in the shadows, clustering around the occasional hulking queen of a showstopper that threatens to shred user files in her chitinous mandibles.

Yes, we’re talking about Windows 10, which in recent times has been plagued by an alarming amount of bugs. This started with the infamous October 2018 Update and a doozy of a file deletion faux pas along with a raft of other ‘small but serious’ gremlins that caused the upgrade to actually be put on ice for over a month (an unprecedented move with Windows 10 updates).

  • How to use Windows 10
  • We solve 100 common Windows 10 problems
  • Check out our best laptops of 2019

So Microsoft was careful to thoroughly test the following May 2019 Update, holding the upgrade in the final phases of bug squashing for a considerable time, and rolling it out very slowly and cautiously indeed. Quite rightly so, and with apparent success as users subsequently flocked to the upgrade (albeit with many being pushed by an impending support deadline, mind you).

Still, the rollout itself went well enough – certainly in comparison to the previous one – only afflicted by some minor hiccups which are always likely to be present. However, it’s in solving those little issues where Microsoft has come badly unstuck in September.

Cortana in Windows 10

A recent Microsoft fix introduced a fresh bug to Cortana – and things went downhill from there

(Image credit: Shutterstock)

Fixing the fixes

At the start of September, some long-standing minor bugs (including compatibility issues with certain Intel storage drivers) were fixed by a patch Microsoft issued for Windows 10 May 2019 Update. The problem was that this cumulative update didn’t just fix bugs, but introduced a new one whereby Cortana suddenly caused high levels of CPU usage.

Then the patch to fix this Cortana bug broke something else – the Start menu and Taskbar. Oh, and it also caused audio issues in certain games, and broke internet connectivity for some folks.

If Windows 10 was a china shop, Microsoft was flailing around between the shelves, and in its efforts to fix a broken spout back onto a teapot, cracked a jug by knocking it over with a stray elbow, before managing to send a set of plates crashing to the floor below in an unholy cacophony of shattering porcelain.

In short, the whole situation felt farcical, and was hardly helped when a subsequent bug ‘fix’ for Microsoft’s built-in Windows 10 antivirus actually broke most of Windows Defender’s scanning functionality.

So, following all this,

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

Nearly 8,500 small and medium businesses faced cyberattacks through mimic AI tools in 2025: Kaspersky

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools. In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools.
In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices — said that widespread adoption of artificial intelligence (AI) and machine learning technologies in recent years has provided “threat actors with sophisticated new tools to perpetrate attacks”…
Read More

Continue Reading
Antivirus

The best antivirus software of 2025: Stay safe from online attacks and ransomware scams

These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…

These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…
Read More

Continue Reading
Antivirus

Why This Budget-Friendly VPN & Antivirus Combo Is Blowing Up

If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…

If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…
Read More

Continue Reading
Antivirus

Hackers are using Google.com to deliver malware by bypassing antivirus software. Here’s how to stay safe

Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected This malware only activates during checkout, making it a silent threat to online payments The script opens a WebSocket connection for live control, completely invisible to the average user A new browser-based malware campaign has surfaced, demonstrating how attackers are


  • Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected
  • This malware only activates during checkout, making it a silent threat to online payments
  • The script opens a WebSocket connection for live control, completely invisible to the average user

A new browser-based malware campaign has surfaced, demonstrating how attackers are now exploiting trusted domains like Google.com to bypass traditional antivirus defenses.

A report from security researchers at c/side, this method is subtle, conditionally triggered, and difficult for both users and conventional security software to detect.

It appears to originate from a legitimate OAuth-related URL, but covertly executes a malicious payload with full access to the user’s browser session.

You may like

  • Google Apps Script abused to launch dangerous phishing attacks
  • Criminals hijacking subdomains of popular websites such as Bose or Panasonic to infect victims with malware: here’s how to stay safe
  • Cybercriminals have found a sneaky way of stealing tax accounts and even encrypted messages: here’s what you need to know

Malware hidden in plain sight

The attack begins with a script embedded in a compromised Magento-based ecommerce site which references a seemingly harmless Google OAuth logout URL: https://accounts.google.com/o/oauth2/revoke.

However, this URL includes a manipulated callback parameter, which decodes and runs an obfuscated JavaScript payload using eval(atob(…)).

The use of Google’s domain is central to the deception – because the script loads from a trusted source, most content security policies (CSPs) and DNS filters allow it through without question.

This script only activates under specific conditions. If the browser appears automated or the URL includes the word “checkout,” it silently opens a WebSocket connection to a malicious server. This means it can tailor malicious behavior to user actions.

Read More

Continue Reading