Posted November 18, 2018 08:01:30 Microsoft has released an update for Windows 10 that fixes a serious bug in the security framework used to manage Windows 10 updates.
In particular, the fix for a flaw in the Windows 10 Windows Defender sandbox that could allow attackers to install malware.
The bug is actually a flaw that Microsoft patched in March 2018, but the update addresses it now in a way that could be exploited by malware developers.
Microsoft says that the update will allow for “enhanced security protections in Windows Defender,” but it’s also likely to lead to the addition of more malware, which is why it’s still recommended to install it now.
In other words, if you’re still running Windows 10 version 1703, you’ll probably want to install the update right away, because the new sandbox is probably a problem.
The problem with the bug in question is that Windows Defender’s sandbox is a bit different than the way Windows handles updates.
It has a sandboxed version of the OS, but that sandbox doesn’t actually have any code in it that can actually run code.
The sandbox only works when the update is in the process of being installed, but it does have a sandbox for that sandbox.
If you try to run code inside the sandbox, it will not work, so the update won’t work.
Microsoft said the bug is related to the fact that Windows 10’s sandboxed updates only work for updates that are signed by Microsoft.
In other words: you can’t install a malicious app that doesn’t have a signature on it, so if you run it in a sandbox, you won’t get an update that you can run.
The patch addresses that issue, however, by requiring that all Windows 10 update signatures must be signed.
It also introduces a mechanism to allow the sandbox to be changed when the updates are signed, but this is a subtle change that may not be visible to most users.