Skip to main content
  1. Home
  2. Computing
  3. Legacy Archives

Google wages security war against Microsoft, reveals yet another Windows bug

Add as a preferred source on Google

Microsoft’s recent “call for better coordinated vulnerability disclosure” seems to have hit a brick wall, with Google as quick as ever to expose yet another Windows security glitch. Rated medium for severity, the bug may just be the most troublesome of the three broadcasted this past month.

It’s not (necessarily) that evil hackers will be using the “impersonation check bypass” to wreak havoc on millions of systems running Windows 7 or 8.1, but they could do a lot of harm, and have plenty of time to plan their attacks.

Recommended Videos

Unlike the previous two vulnerabilities made public by Google, this is to be dealt in a matter of weeks… at best. Specifically, on the second Tuesday of February, i.e. the 10th, i.e. the next Patch Tuesday.

As usual, the finder of the malfunction, James Forshaw, followed procedure, posting his discovery on the Google Security Research channel for only authorized eyes to see. That was on October 17, 2014, at which time Microsoft got a note containing the concern and presumed issue’s description.

Of course, the clock began to tick immediately, and Redmond had exactly 90 days to fix things before the post would automatically be derestricted. On October 29, it was confirmed the defect “might constitute a security feature bypass.”

Initially, a universal fix was scheduled to roll out last week, alongside the eight efficient solutions for unrelated “important” and “critical” Windows bugs. But alas, mysterious “compatibility issues” forced a delay for February.

Which brings us to today, and the latest “gotcha” moment in a series of decisions Chris Betz of Microsoft’s Security Response Center deemed “right for Google but not right for customers.” A matter of principle, the search giant would probably reply, and then we’d go back and forth between the equally rational claims of the two arch-rivals.

On one hand, the people have a right to know, but on the other, they’re better off kept in the dark until all is milk and honey again. Or, you know, as close as Windows could ever get to an invulnerable, impenetrable security paradise.

Speaking of your right to know, here’s the bug’s full mind-bending explanation.

Adrian Diaconescu
Former Digital Trends Contributor
Adrian is a mobile aficionado since the days of the Nokia 3310, and a PC enthusiast since Windows 98. Later, he discovered…
Asus reveals ROG Strix XG129C, a tiny secondary monitor chasing Elgato’s gamer lunch
The secondary display category has been waiting for a product that combines a proper screen, real color accuracy, and gaming ecosystem integration in one tidy package.
Strix XG129C secondary display.

If you’ve ever wished your work desk had a dedicated screen for reviewing your system’s performance, chat windows, or streaming controls, so that you don’t have to disturb your main monitor, Asus has heard you. 

The ROG Strix XG129C is a 12.3-inch secondary display with a touchscreen, designed to sit beneath your primary monitor and handle everything that could be a distraction on your main screen, and it costs $199. 

Read more
Intel’s turnaround is one for the ages, without having much to show for it
Wall Street is betting big on Intel before the results arrive
Logo

Intel’s comeback has become one of the market’s biggest surprises. Its stock has risen nearly 490% over the past year, pushing the company back into record territory and reviving confidence in a chipmaker many had written off.

The problem is that Intel still has little product success to justify that excitement.

Read more
Apple’s Continuity features are so good, they make Windows and Android feel incomplete
Android and Windows try, but Apple's ecosystem is on a whole different level.
Mac iPad iPhone with blurred background

Windows and Android platforms have been trying to catch up to Apple's ecosystem. And honestly, in some areas, they have succeeded. But replicating a feature here and there is very different from pulling off what Apple has built. The seamless, almost invisible way all of Apple's devices work together is genuinely hard to replicate.

Apple calls these Continuity features. You can use these features to seamlessly transition from one device to another, unlock devices without entering passwords, transfer files, and much more. 

Read more