Firefox’s verification system has problems, making all add-ons unavailable

Firefox allows users installing add-ons to add extra functionality. Many Firefox users have installed add-ons to meet their needs. To ensure browser security, Firefox includes a verification system that checks if the add-on you are using has been verified for security. However, Firefox has a system problem that causes most of the add-on components to fail this verification after May 4. By default, Firefox will disable add-ons that fail validation, resulting in almost no add-ons can be used. Firefox has introduced a version that fixes this issue. Users who need to use add-ons can update Firefox and resolve the issue.

Windows 10 users may need to remove external storage to get the latest major updates

Windows 10 is a long-term development system that provides users with majar system updates approximately every six months. The latest update will be available to users for download and use in May. However, this update has a place that requires special attention. Microsoft recently released a new Support instructions, indicating that there was a problem in the May major update. If this update is made while an external storage device such as a USB external hard drive or SD card is connected, it may cause the system to incorrectly arrange the storage drives. In view of this, Microsoft will check if the computer is connected to an external device before updating. If an external storage device is found, the system will not update until the device is successfully removed. Microsoft said the issue will be resolved in future update. What Windows 10 users can do now is to follow Microsoft’s …

W3C announces the formal inclusion of the passwordless login mechanism “WebAuthn” into the web standard

Many users of network services have encountered problems due to passwords. And because of the advancement of the times, the security of passwords is becoming unreliable. In recent years, the online world has been constantly seeking a new and non-password-based user authentication method, and now it seems that there is finally a formal answer. The W3C, which is responsible for the Internet standard, recently announced that they have determined all the standards for Web Authentication (WebAuthn) and officially incorporated WebAuthn into the web standard. Under this new standard, users can use their fingerprints or their mobile phones to log in to a supported website without entering any password. Because W3C has started to recommend browsers and websites to support WebAuthn in the past year, some websites have already add login methods using WebAuthn. Now WebAuthn has officially become the network authentication standard. I believe that more websites will support WebAuthn’s …

Mobile version of “Microsoft Excel” will let you import from photos

When you copy the information on the paper into your computer, you often rely on manual input. If you want to copy the form data into Microsoft Excel, there may be a more convenient method in the future. The Microsoft 365 service announced the February update few days ago, mentioning that the Android version of Microsoft Excel has added a new feature. The user can now simply uses the camera to take photo of a form, and the system will automatically converts the form into data in Excel using the AI ​​image recognition system. Users do not need to manually enter their own data. Excel for iOS will also add the same functionality, but it may take a while. Although this is a handy feature, this feature requires a subscription to the Microsoft 365 service.

The number of “fake apps” is on the rise

People often come into contact with mobile apps, but do you pay attention to whether the apps you are using come from trusted sources? Computer security company McAfee recently released the previous year’s mobile threat report. The report said that in the second half of 2018, the number of fake apps detected by the company has increased several times over the first half of the year. Popular apps can easily become mock targets for fake apps. The report uses the “Fortnite” game as an example. The Android version of the game could only be downloaded on a specific platform at the beginning of the beta period. As a result, criminals took the opportunity to make fake apps and put them online to wait for eager users to be fooled. Recently some companies put their app’s installation file onto their own platform for download, instead of putting the app to official …