Connect with us

Tech

How To Think About AI: Is It The Tool, Or Are You?

Published

on

from the do-you-use-your-brain-or-do-you-replace-it? dept

We live in a stupidly polarizing world where nuance is apparently not allowed. Everyone wants you to be for or against something—and nowhere is this more exhausting than with AI. There are those who insist that it’s all bad and there is nothing of value in it. And there are those who think it’s all powerful, the greatest thing ever, and will replace basically every job with AI bots who can work better and faster.

I think both are wrong, but it’s important to understand why.

So let me lay out how I actually think about it. When it’s used properly, as a tool to assist a human being in accomplishing a goal, it can be incredibly powerful and valuable. When it’s used in a way where the human’s input and thinking are replaced, it tends to do very badly.

And that difference matters.

Advertisement

I think back to a post from Cory Doctorow a couple months ago where he tried to make the same point using a different kind of analogy: centaurs and reverse-centaurs.

Start with what a reverse centaur is. In automation theory, a “centaur” is a person who is assisted by a machine. You’re a human head being carried around on a tireless robot body. Driving a car makes you a centaur, and so does using autocomplete.

And obviously, a reverse centaur is a machine head on a human body, a person who is serving as a squishy meat appendage for an uncaring machine.

Like an Amazon delivery driver, who sits in a cabin surrounded by AI cameras, that monitor the driver’s eyes and take points off if the driver looks in a proscribed direction, and monitors the driver’s mouth because singing isn’t allowed on the job, and rats the driver out to the boss if they don’t make quota.

The driver is in that van because the van can’t drive itself and can’t get a parcel from the curb to your porch. The driver is a peripheral for a van, and the van drives the driver, at superhuman speed, demanding superhuman endurance. But the driver is human, so the van doesn’t just use the driver. The van uses the driver up.

Advertisement

Obviously, it’s nice to be a centaur, and it’s horrible to be a reverse centaur.

As Doctorow notes in his piece, some of the companies embracing AI tech are doing so with the goal of building reverse-centaurs. Those are the ones that people are, quite understandably, uncomfortable with and should be mocked. But the reality is, also, it seems quite likely those efforts will fail.

And they’ll fail not just because they’re dehumanizing—though they are—but because the output is garbage. Hallucinations, slop, confidently wrong answers: that’s what happens when nobody with actual knowledge is checking whether any of it makes sense. When AI works well, it’s because a human is providing the knowledge and the creativity.

The reverse-centaur doesn’t just burn out the human. It produces worse work, because it assumes that the AI can provide the knowledge or the creativity. It can’t. That requires a human. The power of AI tools is in enabling a human to take their own knowledge, and their own creativity and enhance it, to do more with it, based on what the person actually wants.

Advertisement

To me it’s a simple question of “what’s the tool?” Is it the AI, used thoughtfully by a human to do more than they otherwise could have? If so, that’s a good and potentially positive use of AI. It’s the centaur in Doctorow’s analogy.

Or is the human the tool? Is it a “reverse centaur”? I think nearly all of those are destined to fail.

This is why I tend not to get particularly worked up by those who claim that AI is going to destroy jobs and wipe out the workforce, who will be replaced by bots. It just… doesn’t work that way.

At the same time, I find it ridiculous to see people still claiming that the technology itself is no good and does nothing of value. That’s just empirically false. Plenty of people—including myself—get tremendous use out of the technology. I am using it regularly in all different ways. It’s been two years since I wrote about how I used it to help as a first pass editor.

Advertisement

The tech has gotten dramatically better since then, but the key insight to me is what it takes to make it useful: context is everything. My AI editor doesn’t just get my draft writeup and give me advice based on that and its training—it also has a sampling of the best Techdirt articles, a custom style guide with details about how I write, a deeply customized system prompt (the part of AI tools that are often hidden from public view) and a deeply customized starting prompt. It also often includes the source articles I’m writing about. With all that context, it’s an astoundingly good editor. Sometimes it points out weak arguments I missed entirely. Sometimes it has nothing to say.

(As an aside, in this article, it suggested I went on way too long explaining all the context I give it to give me better suggestions, and thus I shortened it to just the paragraph above this one).

It’s not always right. Its suggestions are not always good. But that’s okay, because I’m not outsourcing my brain to it. It’s a tool. And way more often than not, it pushes me to be a better writer.

This is why I get frustrated every time people point out a single AI fail or hallucination without context.

Advertisement

The problem only comes in when people outsource their brains. When they become reverse centaurs. When they are the tool instead of using AI as the tool. That’s when hallucinations or bad info matter.

But if the human is in control, if they’re using their own brain, if they’re evaluating what the tool is suggesting or recommending and making the final decision, then it can be used wisely and can be incredibly helpful.

And this gets at something most people miss entirely: when they think about AI, they’re still imagining a chatbot. They think every AI tool is ChatGPT. A thing you talk to. A thing that generates text or images for you to copy-paste somewhere else.

That’s increasingly not where the action is. The more powerful shift is toward agentic AI—tools that don’t just generate content, but actually do things. They write code and run it. They browse the web and synthesize what they find. They execute multi-step tasks with minimal hand-holding. This is a fundamentally different model than “ask a chatbot a question and get an answer.”

Advertisement

I’ve been using Claude Code recently, and this distinction matters. It’s an agent that can plan, execute, and iterate on actual software projects, rather than just a tool talking to me about what to do. But, again, that doesn’t mean I just outsource my brain to it.

I often put Claude Code into plan mode, where it tries to work out a plan, but then I spend quite a lot of time exploring why it was making certain decisions, and asking it to explore the pros and cons of those decisions, and even to provide me with alternative sources to understand the trade-offs of some of the decisions it is recommending. That back and forth has been both educational for me, but also makes me have a better understanding and be comfortable with the eventual projects I use Claude Code to build.

I am using it as a tool, and part of that is making sure I understand what it’s doing. I am not outsourcing my brain to it. I am using it, carefully, to do things that I simply could not have done before.

And that’s powerful and valuable.

Advertisement

Yes, there are so many bad uses of AI tools. And yes, there is a concerted, industrial-scale effort, to convince the public they need to use AI in ways that they probably shouldn’t, or in ways that is actively harmful. And yes, there are real questions about what it costs to train and run the foundation models. And we should discuss those and call those out for what they are.

But the people who insist the tools are useless and provide nothing of value, that’s just wrong. Similarly, anyone who thinks the tech is going to go away are entirely wrong. There likely is a funding bubble. And some companies will absolutely suffer as it deflates. But it won’t make the tech go away.

When used properly, it’s just too useful.

As Cory notes in his centaur piece, AI can absolutely help you do your job, but the industry’s entire focus is on convincing people it can replace your job. That’s the con. The tech doesn’t replace people. But it can make them dramatically more capable—if they stay in the driver’s seat.

Advertisement

The key to understanding the good and the bad of the AI hype is understanding that distinction. Cory explains this in reference to AI coding:

Think of AI software generation: there are plenty of coders who love using AI, and almost without exception, they are senior, experienced coders, who get to decide how they will use these tools. For example, you might ask the AI to generate a set of CSS files to faithfully render a web-page across multiple versions of multiple browsers. This is a notoriously fiddly thing to do, and it’s pretty easy to verify if the code works – just eyeball it in a bunch of browsers. Or maybe the coder has a single data file they need to import and they don’t want to write a whole utility to convert it.

Tasks like these can genuinely make coders more efficient and give them more time to do the fun part of coding, namely, solving really gnarly, abstract puzzles. But when you listen to business leaders talk about their AI plans for coders, it’s clear they’re not looking to make some centaurs.

They want to fire a lot of tech workers – they’ve fired 500,000 over the past three years – and make the rest pick up their work with coding, which is only possible if you let the AI do all the gnarly, creative problem solving, and then you do the most boring, soul-crushing part of the job: reviewing the AIs’ code.

Criticize the hype. Mock the replace-your-workforce promises. Call out the slop factories and the gray goo doomsaying. But don’t mistake the bad uses for the technology itself. When a human stays in control—thinking, evaluating, deciding—it’s a genuinely powerful tool. The important question is just whether you’re using it, or it’s using you.

Advertisement

Filed Under: ai, llms, slop, tools

Source link

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

White House Eyes Data Center Agreements Amid Energy Price Spikes

Published

on

An anonymous reader shares a report: The Trump administration wants some of the world’s largest technology companies to publicly commit to a new compact governing the rapid expansion of AI data centers, according to two administration officials granted anonymity to discuss private conversations.

A draft of the compact obtained by POLITICO lays out commitments designed to ensure energy-hungry data centers do not raise household electricity prices, strain water supplies or undermine grid reliability, and that the companies driving demand also carry the cost of building new infrastructure.

The proposed pact, which is not final and could be subject to change, is framed as a voluntary agreement between President Donald Trump and major U.S. tech companies and data center developers. It could bind OpenAI, Microsoft, Google, Amazon, Facebook parent Meta and other AI giants to a broad set of energy, water and community principles. None of these companies immediately responded to a request for comment.

Source link

Advertisement
Continue Reading

Tech

Amazon may launch a marketplace where media sites can sell their content to AI companies

Published

on

The AI industry’s pursuit of licensable content has been a messy affair, filled with lawsuits and accusations of copyright infringement. Now, as tech companies look for legally safe sources of AI training data, Amazon is reportedly considering launching a marketplace where publishers can license their content directly to AI companies.

The Information reported Monday that the e-commerce giant has been meeting with publishing executives and alerting them to its plans to launch such a marketplace. Ahead of an AWS conference for publishers that occurred Tuesday, Amazon “circulated slides that mention a content marketplace,” wrote the outlet.

Reached by TechCrunch, an Amazon spokesperson didn’t deny the story but didn’t directly address the would-be marketplace either, saying only: “Amazon has built long-lasting, innovative relationships with publishers across many areas of our business, including AWS, Retail, Advertising, AGI, and Alexa. We are always innovating together to best serve our customers, but we have nothing specific to share on this subject at this time.” 

Amazon wouldn’t be the first major tech company to take this route. Microsoft recently launched what it calls a Publisher Content Marketplace (PCM), which it says will give publishers “a new revenue stream” while also providing AI systems with “scaled access to premium content.” Microsoft added that the PCM was designed to “empower publishers with a transparent economic framework for licensing” their content.

Advertisement

The move is a natural next step for the AI industry, which has already sought to solve the legally nebulous problem of how copyrighted material ends up in AI training data by forging deals with major news outlets and media organizations. OpenAI, for instance, has already signed content-licensing partnerships with the Associated Press, Vox Media, News Corp, and The Atlantic, among others.  

Those efforts haven’t been enough to stem the legal fallout. The fight over copyrighted material in AI algorithms has led to a monsoon of lawsuits, and the issue is still being worked out by the judicial system. New regulatory strategies to deal with the issue are being proposed all the time.

Media publishers have also fretted about the ways in which AI summaries — particularly those surfaced by Google in its search results — may be depressing traffic to their sites. One recent study claimed that such summaries have had a “devastating” impact on the number of users clicking through to websites. The Information’s report notes that publishers may view the new marketplace-based content-sharing system as a “more sustainable business [than current, more limited licensing partnerships] that will scale up revenue” as AI usage continues to escalate.

Techcrunch event

Advertisement

Boston, MA
|
June 23, 2026

Source link

Advertisement
Continue Reading

Tech

Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws

Published

on

Patch Tuesday

Today is Microsoft’s February 2026 Patch Tuesday with security updates for 58 flaws, including 6 actively exploited and three publicly disclosed zero-day vulnerabilities.

This Patch Tuesday also addresses five “Critical” vulnerabilities, 3 of which are elevation of privileges flaws and 2 information disclosure flaws.

The number of bugs in each vulnerability category is listed below:

Wiz
  • 25 Elevation of Privilege vulnerabilities
  • 5 Security Feature Bypass vulnerabilities
  • 12 Remote Code Execution vulnerabilities
  • 6 Information Disclosure vulnerabilities
  • 3 Denial of Service vulnerabilities
  • 7 Spoofing vulnerabilities

When BleepingComputer reports on Patch Tuesday security updates, we only count those released by Microsoft today. Therefore, the number of flaws does not include 3 Microsoft Edge flaws fixed earlier this month.

As part of these updates, Microsoft has also begun to roll out updated Secure Boot certificates to replace the original 2011 certificates that are expiring in late June 2026.

Advertisement

“With this update, Windows quality updates include a broad set of targeting data that identifies devices and their ability to receive new Secure Boot certificates,” explains Microsoft in the Windows 11 update notes.

“Devices will receive the new certificates only after they show sufficient successful update signals, which helps ensures a safe and phased rollout.”

To learn more about the non-security updates released today, you can review our dedicated articles on the Windows 11 KB5077181 & KB5075941 cumulative updates and the Windows 10 KB5075912 extended security update.

6 actively exploited zero-days

This month’s Patch Tuesday fixes six actively exploited vulnerabilities, three of which are publicly disclosed.

Advertisement

Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited while no official fix is available.

The six actively exploited zero-days are:

CVE-2026-21510 – Windows Shell Security Feature Bypass Vulnerability

Microsoft has patched an actively exploited Windows security feature bypass that can be triggered by opening a specially crafted link or shortcut file.

Advertisement

“To successfully exploit this vulnerability, an attacker must convince a user to open a malicious link or shortcut file.” explains Microsoft.

“An attacker could bypass Windows SmartScreen and Windows Shell security prompts by exploiting improper handling in Windows Shell components, allowing attacker‑controlled content to execute without user warning or consent,” continued Microsoft.

While Microsoft has not shared further details, it likely allows attackers to bypass the Mark of the Web (MoTW) security warnings.

Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.

Advertisement

CVE-2026-21513 – MSHTML Framework Security Feature Bypass Vulnerability

Microsoft has patched an actively exploited MSHTML security feature bypass flaw in Windows.

“Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network,” explains Microsoft.

There are no details on how this was exploited.

Advertisement

This flaw was once again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, and Google Threat Intelligence Group.

CVE-2026-21514 – Microsoft Word Security Feature Bypass Vulnerability

Microsoft has patched a security feature bypass flaw in Microsoft Word that is actively exploited.

“An attacker must send a user a malicious Office file and convince them to open it,” warns Microsoft’s advisory.

Advertisement

“This update addresses a vulnerability that bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE control,” continues Microsoft.

Microsoft says that the flaw cannot be exploited in the Office Preview Pane.

The flaw was again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.

As no details have been released, it is unclear if CVE-2026-21510, CVE-2026-21513, and CVE-2026-21514 were exploited in the same campaign.

Advertisement

CVE-2026-21519 – Desktop Window Manager Elevation of Privilege Vulnerability

Microsoft has patched an actively exploited elevation of privileges flaw in the Desktop Window Manager.

“An attacker who successfully exploited this vulnerability could gain SYSTEM privileges,” warns Microsoft.

No details have been shared on how it was exploited.

Advertisement

Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC) & Microsoft Security Response Center (MSRC).

CVE-2026-21525 – Windows Remote Access Connection Manager Denial of Service Vulnerability

Microsoft fixed an actively exploited denial of service flaw in the Windows Remote Access Connection Manager.

“Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally,’ explains Microsoft.

Advertisement

Microsoft has attributed the discovery of the flaw to the ACROS Security team with 0patch.

ACROS CEO Mitja Kolsek told BleepingComputer that the exploit was found in a public malware repository but is unsure how it is being exploited in attacks.

“We found an exploit for this issue in December 2025 in a public malware repository while searching for an exploit for CVE-2025-59230,” Kolsek told BleepingComputer.

“This issue turned out to be a 0day at the time, so we patched it (blog.0patch.com/2025/12/free-micropatches-for-windows-remote.html) and reported it to Microsoft. We don’t have any information on it having been exploited, but the quality of the combined exploit for both issues suggested professional work.”

Advertisement

CVE-2026-21533 – Windows Remote Desktop Services Elevation of Privilege Vulnerability

Microsoft has fixed an elevation of privileges in Windows Remote Desktop Services.

“Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally,” explains Microsoft.

Microsoft has attributed the discovery of the flaw to the Advanced Research Team at CrowdStrike.

Advertisement

CrowdStrike told BleepingComputer that the exploit they observed allows threat actors to add a new user to the Administrator group.

“The CVE-2026-21533 exploit binary modifies a service configuration key, replacing it with an attacker-controlled key, which could enable adversaries to escalate privileges to add a new user to the Administrator group,” Adam Meyers, Head of Counter Adversary Operations, CrowdStrike, told BleepingComputer.

“While CrowdStrike does not currently attribute this activity to a specific target or adversary, threat actors possessing the exploit binaries will likely accelerate their attempts to use or sell CVE-2026-21533 in the near term.”

Of the six zero-days, CVE-2026-21513, CVE-2026-21510, and CVE-2026-21514 were publicly disclosed.

Advertisement

Recent updates from other companies

Other vendors who released updates or advisories in February 2026 include:

While not a security update, Microsoft has started rolling out built-in Sysmon functionality in Windows 11 insider builds, which many Windows admins will find useful.

The February 2026 Patch Tuesday Security Updates

Below is the complete list of resolved vulnerabilities in the February 2026 Patch Tuesday updates.

To access the full description of each vulnerability and the systems it affects, you can view the full report here.

Advertisement


Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Advertisement


Advertisement



Advertisement


Tag CVE ID CVE Title Severity
.NET CVE-2026-21218 .NET Spoofing Vulnerability Important
Azure Arc CVE-2026-24302 Azure Arc Elevation of Privilege Vulnerability Critical
Azure Compute Gallery CVE-2026-23655 Microsoft ACI Confidential Containers Information Disclosure Vulnerability Critical
Azure Compute Gallery CVE-2026-21522 Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability Critical
Azure DevOps Server CVE-2026-21512 Azure DevOps Server Cross-Site Scripting Vulnerability Important
Azure Front Door (AFD) CVE-2026-24300 Azure Front Door Elevation of Privilege Vulnerability Critical
Azure Function CVE-2026-21532 Azure Function Information Disclosure Vulnerability Critical
Azure HDInsights CVE-2026-21529 Azure HDInsight Spoofing Vulnerability Important
Azure IoT SDK CVE-2026-21528 Azure IoT Explorer Information Disclosure Vulnerability Important
Azure Local CVE-2026-21228 Azure Local Remote Code Execution Vulnerability Important
Azure SDK CVE-2026-21531 Azure SDK for Python Remote Code Execution Vulnerability Important
Desktop Window Manager CVE-2026-21519 Desktop Window Manager Elevation of Privilege Vulnerability Important
Github Copilot CVE-2026-21516 GitHub Copilot for Jetbrains Remote Code Execution Vulnerability Important
GitHub Copilot and Visual Studio CVE-2026-21523 GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability Important
GitHub Copilot and Visual Studio CVE-2026-21256 GitHub Copilot and Visual Studio Remote Code Execution Vulnerability Important
GitHub Copilot and Visual Studio CVE-2026-21257 GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability Important
GitHub Copilot and Visual Studio Code CVE-2026-21518 GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability Important
Mailslot File System CVE-2026-21253 Mailslot File System Elevation of Privilege Vulnerability Important
Microsoft Defender for Linux CVE-2026-21537 Microsoft Defender for Endpoint Linux Extension Remote Code Execution Vulnerability Important
Microsoft Edge (Chromium-based) CVE-2026-1861 Chromium: CVE-2026-1861 Heap buffer overflow in libvpx Unknown
Microsoft Edge (Chromium-based) CVE-2026-1862 Chromium: CVE-2026-1862 Type Confusion in V8 Unknown
Microsoft Edge for Android CVE-2026-0391 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability Moderate
Microsoft Exchange Server CVE-2026-21527 Microsoft Exchange Server Spoofing Vulnerability Important
Microsoft Graphics Component CVE-2026-21246 Windows Graphics Component Elevation of Privilege Vulnerability Important
Microsoft Graphics Component CVE-2026-21235 Windows Graphics Component Elevation of Privilege Vulnerability Important
Microsoft Office Excel CVE-2026-21261 Microsoft Excel Information Disclosure Vulnerability Important
Microsoft Office Excel CVE-2026-21258 Microsoft Excel Information Disclosure Vulnerability Important
Microsoft Office Excel CVE-2026-21259 Microsoft Excel Elevation of Privilege Vulnerability Important
Microsoft Office Outlook CVE-2026-21260 Microsoft Outlook Spoofing Vulnerability Important
Microsoft Office Outlook CVE-2026-21511 Microsoft Outlook Spoofing Vulnerability Important
Microsoft Office Word CVE-2026-21514 Microsoft Word Security Feature Bypass Vulnerability Important
MSHTML Framework CVE-2026-21513 MSHTML Framework Security Feature Bypass Vulnerability Important
Power BI CVE-2026-21229 Power BI Remote Code Execution Vulnerability Important
Role: Windows Hyper-V CVE-2026-21244 Windows Hyper-V Remote Code Execution Vulnerability Important
Role: Windows Hyper-V CVE-2026-21255 Windows Hyper-V Security Feature Bypass Vulnerability Important
Role: Windows Hyper-V CVE-2026-21248 Windows Hyper-V Remote Code Execution Vulnerability Important
Role: Windows Hyper-V CVE-2026-21247 Windows Hyper-V Remote Code Execution Vulnerability Important
Windows Ancillary Function Driver for WinSock CVE-2026-21236 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Important
Windows Ancillary Function Driver for WinSock CVE-2026-21241 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Important
Windows Ancillary Function Driver for WinSock CVE-2026-21238 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Important
Windows App for Mac CVE-2026-21517 Windows App for Mac Installer Elevation of Privilege Vulnerability Important
Windows Cluster Client Failover CVE-2026-21251 Cluster Client Failover (CCF) Elevation of Privilege Vulnerability Important
Windows Connected Devices Platform Service CVE-2026-21234 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Important
Windows GDI+ CVE-2026-20846 GDI+ Denial of Service Vulnerability Important
Windows HTTP.sys CVE-2026-21240 Windows HTTP.sys Elevation of Privilege Vulnerability Important
Windows HTTP.sys CVE-2026-21250 Windows HTTP.sys Elevation of Privilege Vulnerability Important
Windows HTTP.sys CVE-2026-21232 Windows HTTP.sys Elevation of Privilege Vulnerability Important
Windows Kernel CVE-2026-21231 Windows Kernel Elevation of Privilege Vulnerability Important
Windows Kernel CVE-2026-21222 Windows Kernel Information Disclosure Vulnerability Important
Windows Kernel CVE-2026-21239 Windows Kernel Elevation of Privilege Vulnerability Important
Windows Kernel CVE-2026-21245 Windows Kernel Elevation of Privilege Vulnerability Important
Windows LDAP – Lightweight Directory Access Protocol CVE-2026-21243 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability Important
Windows Notepad App CVE-2026-20841 Windows Notepad App Remote Code Execution Vulnerability Important
Windows NTLM CVE-2026-21249 Windows NTLM Spoofing Vulnerability Important
Windows Remote Access Connection Manager CVE-2026-21525 Windows Remote Access Connection Manager Denial of Service Vulnerability Moderate
Windows Remote Desktop CVE-2026-21533 Windows Remote Desktop Services Elevation of Privilege Vulnerability Important
Windows Shell CVE-2026-21510 Windows Shell Security Feature Bypass Vulnerability Important
Windows Storage CVE-2026-21508 Windows Storage Elevation of Privilege Vulnerability Important
Windows Subsystem for Linux CVE-2026-21237 Windows Subsystem for Linux Elevation of Privilege Vulnerability Important
Windows Subsystem for Linux CVE-2026-21242 Windows Subsystem for Linux Elevation of Privilege Vulnerability Important
Windows Win32K – GRFX CVE-2023-2804 Red Hat, Inc. CVE-2023-2804: Heap Based Overflow libjpeg-turbo Important

Update 2/10/26: Added information about how CVE-2026-21533 and CVE-2026-21525 are exploited.

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

Advertisement

Source link

Continue Reading

Tech

Steam Frame release date, rumours and everything we know

Published

on

2026 is set to be a huge year for Valve, as the brand behind Steam and the brilliant Steam Deck is set to launch exciting new additions to its hardware line-up.

There’s the Steam Machine, Steam Controller and, notably, the Steam Frame which is Valve’s first foray into VR headsets. Although Valve is yet to reveal how much the Steam Frame will cost, nor when we’ll be able to get our hands on the headset, its specs have been revealed.

Keep reading to learn more about the upcoming Steam Frame, including its rumoured price and release date to its confirmed tech specs. Make sure you also visit our list of the best game consoles to enhance your gaming set-up. 

Last updated: February 10th 2026 with updates from Valve on pricing and launch date

Advertisement

Steam Frame at a Glance

  • Set to launch within the first half of 2026
  • Exact launch date and pricing is still yet to be determined by Valve
  • Delayed announcements blamed on RAM prices and shortages crisis
  • Wireless VR headset
  • Available in two sizes: 256GB and 1TB
  • Runs on 2024’s mobile flagship processor, Snapdragon 8 Gen 3
  • Eye-tracking technology
  • Powered by SteamOS
  • Comes equipped with dual controllers for playing non-VR games

Advertisement

Steam Frame price rumours

Despite announcing the hardware back in November 2025, Valve has still not disclosed how much the Steam Frame, nor any of the upcoming devices, will cost. However, Valve has now addressed this in a recent statement (February 4th) and, as predicted, the ongoing memory shortages are to blame for the lack of information.

Essentially, Valve said that due to the limited availability and rising prices of critical components, the brand needs to “revisit [its] exact shipping schedule and pricing”. So, while Valve had originally expected to have revealed the price and launch date by now, the crisis has delayed this. This perhaps isn’t surprising, as RAM prices have been dominating headlines for the past few weeks, and the lack of update from Valve was starting to raise eyebrows.

It’s worth noting that Valve hasn’t explicitly stated that it needs to increase the price of any upcoming Steam hardware, although of course we didn’t know for sure what the RRP was going to be in the first place. While it’s unavoidable that the Steam Frame will cost more than we hoped, this does remain unconfirmed.

Steam Frame and controllers Steam Frame and controllers
Steam Frame and controllers. Image Credit (Valve)

If you’ve been keeping track of the rumours surrounding the Steam Frame, then you’ll likely have seen that listings for the VR headset and the Steam Machine were discovered on a Czech online retailer, Smarty. While there wasn’t any price on the listing, internet sleuths inspected the site and found prices within its code. Seriously. 

As reported by The Mysticle’s YouTube, the Steam Frame was listed for 17900 CZK (256GB) and 21990 CZK (1TB). That roughly converts to around $860 and $1060. Of course, we don’t know whether that was an accurate price in the first place and we definitely don’t know whether the price would remain the same now that Valve has publicly addressed its delayed pricing reveal and need to address the price again. 

Advertisement

Advertisement

Essentially, we’ll simply have to just wait for Valve to determine the pricing strategy and reveal it to us.

Steam Frame release date rumours

When Valve originally unveiled the Steam Frame, the brand said we would expect the new launches in “early 2026”. However, since that initial announcement, there’s been speculation that the ongoing RAM price crisis would delay the hardware. While this was mostly internet rumours, Valve has recently confirmed it did indeed have to revisit its shipping strategy, alongside the price too. 

While Valve has stated that the “goal of shipping all three products [Steam Frame, Steam Machine and Steam Controller] in the first half of the year has not changed”, the brand says that it needs to try to land on concrete pricing and launch dates, although this is difficult as the circumstances surrounding both can change so quickly. 

Advertisement

We appreciate Valve providing this update, but for now it seems we’re no closer to knowing when we can expect the long awaited Steam hardware.

Steam Frame specs

Sure, both the release date and price for the Steam Frame are still at large, but Valve has unveiled all the specs for the upcoming VR headset. While Valve has been careful to caveat that some of the specifications are subject to change ahead of availability, the initial specs are undoubtedly exciting. 

First and foremost, the Steam Frame is a PC and runs SteamOS powered by the Snapdragon 8 Gen 3 mobile processor. That means it’s the first of its kind that can handle the entire Steam Library, allowing you to play both VR and non-VR games without needing to connect to your PC. 

Advertisement

Advertisement

Essentially, the headset uses a 6GHz wireless adapter for streaming and dual radios: one for audio and visual streaming and another for connecting to your Wi-Fi.

Steam Frame ControllersSteam Frame Controllers

Plus, the Steam Frame comes equipped with dual controllers which are fitted with all the familiar inputs you need for non-VR games, such as the D-Pad, ABXY, thumbsticks and more. Speaking of the thumbsticks, they’re the same found in the upcoming Steam Controller and are magnetic for improved feel and responsiveness.

The Steam Frame also introduces Foveated Streaming which Valve explains that foveate streaming uses eye tracking data so that the PC only streams high resolution data in the area you’re looking at. As it’s a system-level feature, it applies to all games. The headset also uses eye tracking to ensure the best quality pixels are saved for only where you’re looking, which should theoretically help the Steam Frame run more efficiently too. Even so, it’s worth noting each panel is a 2160 x 2160 LCD too.

Technical specifications aside, the Steam Frame promises to be easy to use with no set-up required. Valve explains the Steam Frame is equipped with four high-res cameras that provide both controller and headset tracking, with infrared LEDs to track in dark environments too.

Advertisement

Advertisement

Finally, if you’re a glasses wearer then you might be wondering whether it’s possible to don the Steam Frame while wearing glasses. Valve has stated that your ability to comfortably wear glasses while the Steam Frame will depend on the width of the frames. However, Valve has teased that it’s “looking into making prescription lens inserts available ahead of launch”, although that’s all the information we have on that. 

Source link

Advertisement
Continue Reading

Tech

Making A Hidden Door Status Sensor

Published

on

The door sensor in its new enclosures. (Credit: Dillan Stock)
The door sensor in its new enclosures. (Credit: Dillan Stock)

A common sight in ‘smart homes’, door sensors allow you to detect whether a door is closed or open, enabling the triggering of specific events. Unfortunately, most solutions for these sensors are relatively bulky and hard to miss, making them a bit of a eyesore. This was the case for [Dillan Stock] as well, who decided that he could definitely have a smart home, yet not have warts sticking out on every single doorframe and door. There’s also a video version of the linked blog post.

These door sensors tend to be very simple devices, usually just a magnet and a reed relay, the latter signaling a status change to the wireless transmitter or transceiver. Although [Dillan] had come across recessed door sensors before, like a Z-wave-based unit from Aeotec, this was a very poorly designed product with serious reliability issues.

That’s when [Dillan] realized that he could simply take the PCB from one of the Aqara T1 door sensors that he already had and stuff them into a similar 20 mm diameter form factor as that dodgy sensor unit. Basically this just stuffs the magnet and PCB from an existing wart-style sensor into a recessed form factor, making it a very straightforward hack, that only requires printing the housings for the Aqara T1 sensor and some intimate time between the door and a drill.

Advertisement

Source link

Advertisement
Continue Reading

Tech

Find My outage & iCloud issues hit users once again

Published

on

Apple has acknowledged that users may be encountering issues with iCloud services, Photos sync, or an outright outage with Find My on Tuesday afternoon.

The green circle, yellow diamond, and red triangle that represents Apple's System Status symbols for Available, Issue, and Outage
Another services outage has affected users

Everything you do on an iPhone touches some kind of service, which can experience an outage from time to time. If you noticed that a file just won’t sync, or you can’t see your friend’s location, it’s because of an ongoing issue.
According to Apple’s System Status page, various iCloud services began facing issues around 2:02 p.m. ET and Find My saw a full outage that began at 3:04 p.m. ET. Users attempting to utilize those features could encounter errors or endless loading.
Continue Reading on AppleInsider | Discuss on our Forums

Source link

Continue Reading

Tech

Discord age verification not a requirement for every user, but still bad

Published

on

Discord is relying on algorithmic data analysis and third-party vendors to handle age verification, but it has clarified that not everyone will be met with explicit age checks.

The purple Discord app icon with a pacifier added to the alien logo
Everyone is treated as a child on Discord until they try to access adult content

The latest update from Discord’s safety team seems to be a big step back from its earlier promise, though not much has actually changed. The controversial move will have everyone’s account set to teen by default, and while some will need to do age verification via face or ID scan, not everyone will.
This “clarification” was issued after mass pushback about the moderation changes taking place on the social platform. Discord says it has used this system in the UK and Australia since the end of 2025 and is now rolling it out globally to meet regulatory requirements for online services.
Continue Reading on AppleInsider | Discuss on our Forums

Source link

Continue Reading

Tech

RRAM hasn't delivered yet, but stacked memory is being pitched to run neural networks in place

Published

on


A team at the University of California, San Diego has redesigned how RRAM operates in an effort to accelerate the execution of neural network models. According to UCSD electrical engineer Duygu Kuzum, the approach could eventually enable a new class of local AI applications, assuming the technology’s remaining challenges can…
Read Entire Article
Source link

Continue Reading

Tech

Google now helps you wipe your sensitive personal data and photos from Search

Published

on

Google Search can make information easy to find, but it can also make your personal data surface in ways that feel invasive or even dangerous. This is why Google is rolling out new tools that give people more control over what shows up about them online.

The company says it is expanding its Search removal features to make it simpler to take down sensitive personal information and explicit images that never should have been public in the first place.

How to remove personal information from Search

Google’s “Results about you hub” can now help you find and remove search results that contain sensitive government-issued identification numbers. This includes things like passport numbers, driver’s license numbers, and other official ID info that could be misused if they appear online.

To use this feature, you sign in to your Google account and select ‘Results about you,’ where you can fill out the information you want to track. Google will proactively scan Search for results that match your personal information and alert you if it finds something.

From there, you can review each result and request removal directly within the tool. You can also manually submit a removal request if you come across sensitive information yourself. Google says it will review these requests and remove results that violate its policies.

Advertisement

How to remove explicit images from Search

Google is also simplifying the process for removing explicit images, especially those shared without consent. You can now request the removal of explicit images more easily, including submitting multiple images at once rather than filing separate requests.

Once an image is removed, Google will also offer an option to proactively filter out similar explicit images from future Search results, to prevent similar content from resurfacing.

You can now track all your removal requests in one place through the Results about you hub, with email updates to keep you informed whenever the status changes.

Google also points out that removing information from Search does not erase it from the internet altogether, but it can still go a long way in protecting your privacy.

The update also comes as Google shuts down its dark web reports, which previously alerted users when their name, phone number, or email surfaced online in a data breach.

Google says those alerts did not always help people take meaningful action, something the new removal tools are designed to address.

Advertisement

Source link

Continue Reading

Tech

Microsoft releases Windows 10 KB5075912 extended security update

Published

on

Windows 10

Microsoft has released the Windows 10 KB5075912 extended security update to fix February 2026 Patch Tuesday vulnerabilities, including six zero-days, and continue rolling out replacements for expiring Secure Boot certificates.

If you are running Windows 10 Enterprise LTSC or are enrolled in the ESU program, you can install this update like normal by going into Settings, clicking on Windows Update, and manually performing a ‘Check for Updates.’

Windows 10 KB5075912 update
Windows 10 KB5075912 update
Source: BleepingComputer

After installing this update, Windows 10 will be updated to build 19045.6937, and Windows 10 Enterprise LTSC 2021 will be updated to build 19044.6937.

Wiz

What’s new in Windows 10 KB5075912

Microsoft is no longer releasing new features for Windows 10, and the KB5075912 update contains only security fixes and bug fixes introduced by previous security updates.

With today’s February 2026 Patch Tuesday, Microsoft has fixed 58 vulnerabilities, including six actively exploited zero-day flaws.

KB5075912 also fixes a known issue that prevented Windows 10 devices from shutting down or hibernating if System Guard Secure Launch is enabled.

Advertisement

The complete list of fixes is below:

  • [Fonts] This update includes changes to Chinese fonts to meet GB18030-2022A compliance.
  • [OS Security (known issue)] Fixed: After installing the Windows security update released on or after January 13, 2026, some Secure Launch-capable PCs with Virtual Secure Mode (VSM) enabled are unable to shut down or enter hibernation. Instead, the device restarts.
  • [Folders] Fixed: This update fixes an issue that affects folder renaming with desktop.ini files in File Explorer. The LocalizedResourceName setting was ignored, so custom folder names did not show. Now, custom folder names appear as expected.
  • [Graphics] Fixed: A stability issue affecting certain graphics processing units (GPUs) configurations.
  • [Secure Boot] With this update, Windows quality updates include a broad set of targeting data that identifies devices and their ability to receive new Secure Boot certificates. Devices will receive the new certificates only after they show sufficient successful update signals, which helps ensure a safe and phased rollout.

Since June 2025, Microsoft has warned that multiple Windows Secure Boot certificates from 2011 are expiring in June 2026, and warned that if they are not updated, it would breach Secure Boot protections.

These certificates are used to validate Windows boot components, third-party bootloaders, and Secure Boot revocation updates, and if expired, could allow threat actors to bypass security protections.

As part of today’s update, Microsoft continues to roll out the new Secure Boot certificates to targeted systems, with updates to additional systems being installed as the targeting scope expands.

Microsoft states that there are no known issues with this update.

Advertisement

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

Source link

Continue Reading

Trending

Copyright © 2025