This is a news story, published by Wired, that relates primarily to Alon Leviev news.
For more Alon Leviev news, you can click here:
more Alon Leviev newsFor more operating systems news, you can click here:
more operating systems newsFor more news from Wired, you can click here:
more news from WiredOtherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best tech news, business news, entertainment news, and much more. If you like this article about operating systems, you might also like this article about
Windows virtualization security mechanism. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest Windows protection news, possible downgrade attack methods news, news about operating systems, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
Windows Secure KernelWired
•58% Informative
New research shows that a vulnerability in Windows Update could be exploited to downgrade Windows to older versions.
Alon Leviev , the researcher who discovered the flaw, says he started looking for possible downgrade attack methods after seeing that a startling hacking campaign from last year was using a type of malware that relied on downgrading the Windows boot manager to an old, vulnerable version.
Microsoft says that it is working on a complex process to carefully patch the issue, dubbed "Downdate".
VR Score
42
Informative language
31
Neutral language
19
Article tone
informal
Language
English
Language complexity
75
Offensive language
not offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
detected
Time-value
medium-lived
External references
1
Source diversity
1
Affiliate links
no affiliate links