Along with revealing this huge Window 10 news, Microsoft has also teased its one billion fans with a new update that looks set to arrive very soon with the firm boasting that it's been "designed for a new era".
Microsoft is warning users that new, critical remote code execution bugs affecting all current versions of Windows is being actively exploited. Attackers could exploit the Adobe Type 1 PostScript format vulnerability by convincing a user to open a specially crated documents or viewing it in the Windows Preview pane, according to Microsoft.
The advisory said that Microsoft was aware of hackers launching "limited, targeted attacks", but did not say who was launching the attacks or at what scale. The remote code execution flaw stems from the way Windows handles and renders fonts using the Adobe Type Manager Library.
Microsoft says that hackers are exploiting a vulnerability in all current versions of Windows that lets them hijack users' computers - and there's now no fix.
As a result, Only Windows 7 enterprise users with extended security support will receive a patch for the newly-identified weakness. The workarounds are pretty straight forward, varying from disabling the Windows preview pane, or disabling the WebClient service, to renaming atmfd.dll so it isn't used by the system. As for when a patch may be available, Microsoft simply says that patches "address security vulnerabilities in Microsoft software are typically released on Update Tuesday". When this service is disabled, Microsoft said WebDAV requests aren't transmitted and services that depend on the WebClient service won't start.
Until the patch is issued, you can avoid being targeted by not downloading files from unreliable sites/sources.
Disabling the Adobe Type Manager Font Driver (ATMFD) will cause applications that rely on embedded font technology to not display properly, and can cause certain applications to stop working properly in they use OpenType fonts, Microsoft said.