Close Menu
Beverly Hills Examiner

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    David Byrne adds more UK and Ireland shows to summer 2026 ‘Who Is The Sky?’ world tour

    February 4, 2026

    Amazon AWS CEO Matt Garman pushes back against Elon Musk’s space data centers plan

    February 4, 2026

    Trump Just Made The Most Insane Statement About Elections In The History Of The Oval Office

    February 4, 2026
    Facebook X (Twitter) Instagram
    Beverly Hills Examiner
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    Beverly Hills Examiner
    Home»Technology»Microsoft’s Recall Feature Is Even More Hackable Than You Thought
    Technology

    Microsoft’s Recall Feature Is Even More Hackable Than You Thought

    By June 7, 2024
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Microsoft’s Recall Feature Is Even More Hackable Than You Thought


    Microsoft’s CEO Satya Nadella has hailed the company’s new Recall feature, which stores a history of your computer desktop and makes it available to AI for analysis, as “photographic memory” for your PC. Within the cybersecurity community, meanwhile, the notion of a tool that silently takes a screenshot of your desktop every five seconds has been hailed as a hacker’s dream come true and the worst product idea in recent memory.

    Now, security researchers have pointed out that even the one remaining security safeguard meant to protect that feature from exploitation can be trivially defeated.

    Since Recall was first announced last month, the cybersecurity world has pointed out that if a hacker can install malicious software to gain a foothold on a target machine with the feature enabled, they can quickly gain access to the user’s entire history stored by the function. The only barrier, it seemed, to that high-resolution view of a victim’s entire life at the keyboard was that accessing Recall’s data required administrator privileges on a user’s machine. That meant malware without that higher-level privilege would trigger a permission pop-up, allowing users to prevent access, and that malware would also likely be blocked by default from accessing the data on most corporate machines.

    Then on Wednesday, James Forshaw, a researcher with Google’s Project Zero vulnerability research team, published an update to a blog post pointing out that he had found methods for accessing Recall data without administrator privileges—essentially stripping away even that last fig leaf of protection. “No admin required ;-)” the post concluded.

    “Damn,” Forshaw added on Mastodon. “I really thought the Recall database security would at least be, you know, secure.”

    Forshaw’s blog post described two different techniques to bypass the administrator privilege requirement, both of which exploit ways of defeating a basic security function in Windows known as access control lists that determine which elements on a computer require which privileges to read and alter. One of Forshaw’s methods exploits an exception to those control lists, temporarily impersonating a program on Windows machines called AIXHost.exe that can access even restricted databases. Another is even simpler: Forshaw points out that because the Recall data stored on a machine is considered to belong to the user, a hacker with the same privileges as the user could simply rewrite the access control lists on a target machine to grant themselves access to the full database.

    That second, simpler bypass technique “is just mindblowing, to be honest,” says Alex Hagenah, a cybersecurity strategist and ethical hacker. Hagenah recently built a proof-of-concept hacker tool called TotalRecall designed to show that someone who gained access to a victim’s machine with Recall could immediately siphon out all the user’s history recorded by the feature. Hagenah’s tool, however, still required that hackers find another way to gain administrator privileges through a so-called “privilege escalation” technique before his tool would work.

    With Forshaw’s technique, “you don’t need any privilege escalation, no pop-up, nothing,” says Hagenah. “This would make sense to implement in the tool for a bad guy.”



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleThe Case for MDMA’s Approval Is Riddled With Problems
    Next Article Oilers look to end lengthy drought: What life looked like the last time a Canadian team won the Stanley Cup

    RELATED POSTS

    Epstein-linked longevity guru Peter Attia leaves David Protein, and his own startup ‘won’t comment’

    February 4, 2026

    Upgrade Your Roku Before the Big Game

    February 3, 2026

    Fintech CEO and Forbes 30 Under 30 alum has been charged for alleged fraud

    February 3, 2026

    Dyson Deals: WIRED’s Top Pick Pet Vacuum and Purifier Heater

    February 2, 2026

    TikTok says its services are restored after the outage

    February 2, 2026

    Building a Watch Collection on a Budget? Here’s Where to Start (2026)

    February 1, 2026
    latest posts

    David Byrne adds more UK and Ireland shows to summer 2026 ‘Who Is The Sky?’ world tour

    David Byrne has added fresh UK and Ireland shows to his ‘Who Is The Sky?’…

    Amazon AWS CEO Matt Garman pushes back against Elon Musk’s space data centers plan

    February 4, 2026

    Trump Just Made The Most Insane Statement About Elections In The History Of The Oval Office

    February 4, 2026

    Judge restricts use of tear gas on protesters at Portland ICE facility

    February 4, 2026

    Epstein-linked longevity guru Peter Attia leaves David Protein, and his own startup ‘won’t comment’

    February 4, 2026

    NASA’s Artemis II moon mission engulfed by debate over its controversial heat shield

    February 4, 2026

    Twinless review – a twee showcase for actor Dylan…

    February 4, 2026
    Categories
    • Books (1,039)
    • Business (5,945)
    • Film (5,881)
    • Lifestyle (3,983)
    • Music (5,949)
    • Politics (5,950)
    • Science (5,292)
    • Technology (5,879)
    • Television (5,568)
    • Uncategorized (2)
    • US News (5,931)
    popular posts

    Jamaica on a Budget: Fun-Filled Adventures for You and the Mini-Mes

    Travel By Maya Jones | March 20, 2024 Jamaica, with its vibrant culture, stunning beaches, and lush rainforests,…

    Now You See Me: Now You Don’t review – new,…

    November 13, 2025

    How Skull And Bones Gameplay Will Be Different From AC Black Flag

    July 11, 2022

    New York man sentenced 3 months in prison for threatening phone calls against Marjorie Taylor Greene

    August 26, 2023
    Archives
    Browse By Category
    • Books (1,039)
    • Business (5,945)
    • Film (5,881)
    • Lifestyle (3,983)
    • Music (5,949)
    • Politics (5,950)
    • Science (5,292)
    • Technology (5,879)
    • Television (5,568)
    • Uncategorized (2)
    • US News (5,931)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    NASA’s Artemis II moon mission engulfed by debate over its controversial heat shield

    February 4, 2026

    Twinless review – a twee showcase for actor Dylan…

    February 4, 2026

    ‘High Potential’ Boss Breaks Down Morgan’s Panic Attack and Comfort From Karadec Amid New Relationship (Exclusive)

    February 4, 2026
    © 2026 Beverly Hills Examiner. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT