Microsoft Store announced that starting on July 16, it will begin prohibiting the sale of open-source apps that are generally free outside the store. The developer community is not happy about it. Giorgio Sardo, Engineering General Manager in the Experiences and Devices organization at Microsoft Corp, explains in a tweet that this action will tackle illegitimate app listings, but developers say that it can also affect the legit app creators. SUSE. “The Store provides independent open-source developers an opportunity to create sustainable projects by charging a reasonable amount there.” Microsoft Store is a platform for developers who release open-source apps to collect donations and promote the visibility and accessibility of their apps. However, with the broad, vague policy coming, the said advantage will be stripped away from all developers. “Several projects have benefited from being sold in the Store, not copycats, but the official upstream projects: WinSCP, Krita, more. In addition to hurting them, this could also drive more Store apps to go proprietary,” adds Barnes. This is all true as Microsoft describes some of the apps on the store, such as Paint.NET. In its description, the store notes that by buying “Paint.NET in the Windows Store, you’ll be supporting its development directly (normally we ask for a donation).” Sardo defends the planned change, saying it is only directed toward people who are putting and selling apps they don’t own on the Microsoft Store. We absolutely want to support developers distributing successfully OSS apps,” Sardo writes in a tweet. “In fact, there are already fantastic OSS apps in the Store! The goal of this policy is to protect customers from misleading listings.” Barnes says that he recognized the purpose of the policy change is “intended to thwart copycat open source apps repackaged by third parties and sold at absurd prices.” He adds that he supports removing such apps but expresses dissatisfaction at how it could adversely affect all developers in general. “Microsoft is an excellent open-source ecosystem steward and Microsoft Store policies are significantly better than those of the Apple App Store and Google Play Store for both app developers and consumers,” Barnes notes. “However, I strongly encourage Microsoft to revisit the proposed policy as written because it sweeps in legitimate open-source applications published by the official upstream projects. Revenue from sales in the Store supports independent open-source application developers and sustainable open source projects.” Sardo says he appreciates the feedback and that the company “will review to make sure the intent is clear.” Stay informed and visit OUR FORUM.
In the words of several famous or important people, the time has come again. No, we’re not talking about any blockbuster scenes that are about to happen, just about the latest Windows 10 cumulative update.
Indeed, Microsoft has just released new optional updates for those users that are currently running Windows 10 versions 21H2, 21H1, and Windows Server 20H2.
We’re about to take a much closer look and see exactly what new features, fixes, and known issues KB5014666 comes with. This new update, which brings the build versions to 19042.1806, 19043.1806, and 19044.1806, comes with a lot of bug fixes and minor improvements, plus a couple of new printing features.
The first thing you should know about this build i21H2, 21H1, and Windows Server 20H2s that it adds IP address auditing for incoming Windows Remote Management (WinRM) connections in security event 4262 and WinRM event 91.
Know that this addresses an issue that fails to log the source IP address and machine name for a remote PowerShell connection.
Besides that, it also adds Server Message Block (SMB) redirector (RDR) specific public File System Control (FSCTL) code FSCTL_LMR_QUERY_INFO. Furthermore, via KB5014666, the Redmond tech giant is also introducing the following Print and Scan features:
■ IPP over USB support – Microsoft has supported Internet Print Protocol (IPP) for
network printers starting in 2018 with the release of Windows 10, version 1809. We are now
expanding IPP support to USB printers.
■ Print support app (PSA) APIs – Using the PSA framework, printer manufacturers
can extend printer functionalities and user experience. For more information, see the Print support
app design guide.
■ PIN-protected printing for IPP and Universal Print – Standard print dialogs now
include a user interface to enter a PIN code.
■ eSCL Mopria Scan protocol – Windows now supports the eSCL Mopria Scan
protocol. It can be used with Mopria-certified scanner devices.
With that in mind, if you consider yourself a regular user and don’t really care about enterprise-related features and improvements, KB5014666 comes with the following notable changes:
■ Addresses an issue that affects the Cloud Clipboard service and prevents syncing between machines
after a period of inactivity.
■ Addresses an issue that prevents the Pashto language from appearing in the language list.
■ Enables the InternetExplorerModeEnableSavePageAs Group Policy. For more information, see
Microsoft Edge Browser Policy
■ Addresses an issue that affects the touchpad area that responds to a right-click (the right-click
zone). For more information, see
■ Addresses an issue that affects some certificate chains to Root Certification Authorities that are
members of the Microsoft Root Certification Program. For these certificates, the certificate chain
status can be, “This certificate was revoked by its certification authority”.
■ Addresses an issue that leads to a false negative when you run scripts while Windows Defender
Application Control (WDAC) is turned on. This might generate AppLocker events 8029, 8028, or
8037 to appear in the log when they should not.
Microsoft has released security updates with the June 2022 cumulative Windows Updates to address a critical Windows zero-day vulnerability known as Follina and actively exploited in ongoing attacks. "Microsoft strongly recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action," Microsoft said in an update to the original advisory. "Microsoft recommends installing the updates as soon as possible," the company further urged customers in a post on the Microsoft Security Response Center. Tracked as CVE-2022-30190, the security flaw is described by Redmond as a Microsoft Windows Support Diagnostic Tool (MSDT) remote code execution bug that affects all Windows versions still receiving security updates (i.e., Windows 7+ and Server 2008+). Attackers who successfully exploit this zero-day can execute arbitrary code with the privileges of the calling app to install programs, view, change, or delete data, and even create new Windows accounts as allowed by the compromised user's rights. As security researcher nao_sec found, Follina exploits allow threat actors to execute malicious PowerShell commands via MSDT in what Redmond describes as Arbitrary Code Execution (ACE) attacks when opening or previewing Word documents. While applying today's updates does not prevent Microsoft Office from automatically loading Windows protocol URI handlers without user interaction, it blocks PowerShell injection and disables this attack vector. The Follina security vulnerability has been exploited in attacks for a while by state-backed and cybercrime threat actors with various end goals. As Proofpoint security researchers revealed, the Chinese TA413 hacking group exploited the bug in attacks targeting the Tibetan diaspora. In contrast, a second state-aligned threat group used it in phishing attacks against US and EU government agencies. Follina is now also being abused by the TA570 Qbot affiliate in ongoing phishing campaigns to infect recipients with Qbot malware. However, the first attacks targeting this zero-day have started in mid-April, with sextortion threats and invitations to Sputnik Radio interviews as baits. In light of Microsoft reporting active exploitation of the bug in the wild, CISA has also urged Windows admins and users to disable the MSDT protocol abused in these attacks. Shadow Chaser Group's CrazymanArmy, the security researcher who reported the zero-day to Microsoft's security team in April, said the company rejected his initial submission as not a "security-related issue." However, according to the researcher, Redmond's engineers later closed the bug submission report with a remote code execution impact. Follow this and more on OUR FORUM.
After 26 years of suffering as a laughingstock on the web, Internet Explorer was finally put to sleep by Microsoft on June 15. Its spirit, nonetheless, will still be felt by many users for the next years to come as its creator decides to continue to support IE mode in Microsoft Edge until 2029. “Internet Explorer’s reputation today is, deservedly, one of a product from an older era—quirky in behavior and lacking the security of a modern browser,” Microsoft Edge Enterprise General Manager Sean Lyndersay says in a eulogy for the browser. “But its contributions to the evolution of the web have been remarkable, from helping to make the web truly interactive with DHTML and AJAX to hardware-accelerated graphics to innovations in touch/pen browsing. Working on the retirement of Internet Explorer has been a constant reminder of its importance; every day we work with customers who have built their businesses on Internet Explorer. Working on a product with such broad impact has been humbling—our story in many ways is the story of the internet and what it has allowed people and organizations around the world to do.” While Windows 11 is already shipping without the Intenet Explorer, the retirement will remove it from every supported version of Windows 10 Home, Pro, Enterprise, Edu, and IoT. Nonetheless, understanding that some businesses and organizations still rely on Internet Explorer, Microsoft promises to provide continuous IE support on specific versions of Windows currently in support and used in critical environments “until they go out of support.” These versions of Windows include in-support Windows 10 LTSC releases (including IoT), all Windows Server versions, Windows 10 China Government Edition, Windows 8.1, and Windows 7 with Extended Security Updates (ESUs). On the other hand, Microsoft underscores that affected users will be guided to a redirection process to its modern browser, Microsoft Edge with IE mode. Included in this transition is allowing the users to import their data (e.g., favorites, passwords, and settings) from Internet Explorer. They can also manage and delete the data in Microsoft Edge from the Settings menu. “Over the next few months, Internet Explorer will progressively redirect users to our new modern browser, Microsoft Edge with IE mode,” explains Lyndersay. “Users will still see the Internet Explorer icon on their devices (such as on the taskbar or in the Start menu) but if they click to open Internet Explorer, Microsoft Edge will open instead with easy access to IE mode.” The reason behind the IE mode, according to Microsoft, is to cater to some websites that only function using Internet Explorer since they are created using older internet technology. When these users visit such websites and they don’t work properly, they can use the “Reload in IE mode” button in Microsoft Edge to resolve the issue. IT professionals managing legacy sites can also automate IE mode, allowing the pages to launch in IE mode automatically for users. For more visit OUR FORUM.
The European Commission is expected to target Facebook parent Meta, Google, Twitter, Microsoft, and TikTok on Thursday with new measures to tackle forms of disinformation, including deepfakes and fake accounts, according to reports from Reuters and the Financial Times. Companies that fail to adhere to the updated regulation could reportedly face hefty fines. The updated version of the EU's anti-disinformation code will reportedly have tech and social media companies share key data with individual countries to help combat disinformation. An updated "code of practice on disinformation" will require tech companies to disclose how harmful content is being removed and blocked. It will also reportedly more clearly lay out examples of harmful content such as deepfakes, which are video forgeries that make people appear to do or say things they never did. The voluntary code was first introduced in 2018 but will become a co-regulation scheme, according to Reuters. Both regulators and signatories will reportedly share responsibility. There will be 30 signatories, including big tech companies and civil society groups, according to the Financial Times. Social media and online tech companies will also reportedly need to do a better job of informing the public about factual sources. This includes developing tools and partnerships with fact-checkers to push back against "harmful disinformation," which may include removing propaganda and adding "indicators of trustworthiness" on independently verified information, according to the Financial Times. The code will be enforced through the Digital Services Act of 2022, a landmark piece of legislation aimed to rein in Big Tech. Companies that break the code could reportedly face fines of up to 6% of their global revenue. Considering companies such as Google parent Alphabet and Meta brought in $257 billion and $117.93 billion in 2021, respectively, 6% would amount to a hefty chunk. Tech companies can't provide a blanket fix for all of Europe, but instead must show, country by country, how they're fighting disinformation. "We know disinformation is different in every country, and the big platforms will now have to provide meaningful data that would allow [us] to understand better the situation on the country level," said Věra Jourová, the EU's vice president for values and transparency, in a statement to the Financial Times. Jourová added that Russian propaganda following the war in Ukraine shaped the updated anti-disinformation code. For more visit OUR FORUM.
If all goes according to plan, Google will phase out third-party cookies by the end of 2023. These cookies, which brands use to track consumers’ browsing habits across the web, have long been controversial. Recently, the developers of major browsers have begun to block them entirely, preventing websites from saving third-party cookies on users’ systems. The end of these cookies may have big implications for privacy on the web. Third-party cookies are bits of information saved by browsers that were placed on a website by someone other than the owner. For example, pressing the "Like" button on a site may store a cookie on someone’s computer from Facebook, which the company can use to identify the user and the websites they visit. Unlike first-party cookies, which sites use to save preferences and visitor information for later visits, these cookies can track behavior across the web rather than being limited to just one location. In practice, brands and advertisers use third-party cookies to display advertisements that are relevant to users’ browsing habits. For example, if a person visits several sites related to cars, an advertiser may use third-party cookie information to serve them new auto advertisements. The use of third-party cookies has long been controversial. Proponents of online privacy say they make users less private -- and, in some cases, may even create security risks. Google’s decision to phase out third-party cookies by the end of 2023 comes after similar moves made by Apple and Mozilla, the developer of the popular web browser Firefox. No major web browsers will support them once Google phases them out. Apple and Mozilla had similar rationales for ditching third-party cookies -- protecting user privacy from brands and advertisers. Some advertising industry leaders believe consumers will want third-party cookies back so they get relevant ads. However, there’s not much evidence that consumers are particularly anxious about Google’s move to phase these cookies out. There’s a good chance that once the cookies are gone, they’ll be gone for good. The end of third-party cookies is also part of a much bigger movement to protect user privacy online. Along with laws like the GDPR in the EU or the CCPA in California, the disappearance of third-party cookies could signal the growing importance of user privacy to consumers, lawmakers, and businesses. The average consumer will probably experience a few noticeable changes due to Google’s third-party cookie phaseout. It will be much harder for brands to track browsing behavior online. This change will help protect people’s privacy from companies that want to learn more about how they use the internet. It will also make it harder for companies to target advertisements based on users’ interests and browsing history. In the months after the end of third-party cookies, people may notice ads become less specific to their particular interests. In response to the loss of third-party cookie data, marketing agencies and brands will also look for new ways to gather information on consumers’ browsing habits. Most companies that rely on third-party cookie data say they’re not ready for this change, but some brands have already shifted away from using cookies to inform their advertising strategy. People may notice that brands ask for information more frequently, rely on first-party cookies to gather information, and use surveys, polls or other data-gathering strategies to learn more about users’ interests and preferences. This new information will replace the data from third-party cookies that they currently collect. Follow this thread and more on OUR FORUM.