When Windows 10 came out, one of the most used argument by Microsoft to convince users to upgrade to the new version of Windows was its security, which was described as extremely robust in the event of a computer attack.


But this argument has been tainted by the discovery of a researcher from Carnegie-Mellon Private University in Pittsburgh, Pennsylvania. This researcher by the name of Will Dormann has discovered a vulnerability in the main defense feature.


This feature, called Address Space Layout Randomization (ASLR), is not unique to Windows and is found in all major operating systems (such as iOS, MacOS, Android and Linux).


In normal times, ASLR disperses application data randomly into memory each time it is started. This prevents malicious programs from targeting specific memory locations, making their task more arduous.


However, the ASLR feature of Windows 10 has the opposite effect, ensuring that applications always use the same memory location, which makes it easier to work with malicious programs.


Unfortunately, waiting for Microsoft to solve the problem. There is no way for the normal Windows 10 user to mitigate this vulnerability. We can only advise you to be extra careful when browsing the web and downloading documents to your computer.


Original content