Tech
Microsoft Authenticator to Discontinue Password Access—Users Must Switch to Edge by August 1
Starting August 1, users of Microsoft Authenticator will no longer be able to access their stored passwords unless they switch to Microsoft’s Edge browser, as the tech giant begins phasing out traditional password management in favour of more secure login methods known as passkeys.
The change, which Microsoft has been communicating to users via app notifications, is part of a broader shift toward eliminating passwords as a primary authentication tool. In a recent blog post, Microsoft cited a dramatic rise in cyberattacks—more than 7,000 password-related breaches per second in 2024 alone—as a key reason behind the transition.
Microsoft Authenticator, a popular app for multi-factor authentication and one-time passwords, will continue to function as a tool for generating secure codes and supporting biometric login. However, its password autofill and storage features are being migrated exclusively to the Edge browser.
“Although passwords have been around for centuries, we hope their reign over our online world is ending,” Microsoft stated.
Moving to Passkeys
Passkeys are being promoted as a safer and simpler way to log into online accounts. Unlike passwords, passkeys rely on a pair of encrypted keys: one stored securely on the user’s device or in the cloud, and the other on the service provider’s server. Access is granted when both keys match, often triggered through biometrics like fingerprint or facial recognition.
Users can begin setting up passkeys through the Authenticator app by selecting an account and choosing the “Set up a passkey” option, if they haven’t already been prompted to do so. However, not all services currently support passkeys, meaning some traditional passwords will still be required.
How to Access Saved Passwords
Users who want to retain access to passwords stored in Authenticator must install and log into the Edge browser before August 1. Once logged in:
-
iOS users can go to Settings > General > Autofill & Passwords and enable Edge.
-
Android users should navigate to Settings > General Management > Passwords and Autofill > Autofill Service, then select Edge.
-
Desktop users can open Edge and go to Settings > Profiles > Passwords, where they’ll find options to manage and autofill passwords.
Exporting Passwords
Users who prefer to switch to another password manager can export their stored credentials from Authenticator. Within the app, navigate to Settings > Export Passwords to generate a file that can be imported into most third-party managers, including those from Apple, Google, and popular services like LastPass and 1Password.
Microsoft’s move is part of a growing trend in the tech industry to transition away from vulnerable password-based systems toward more robust, encrypted authentication methods. While the shift may pose initial inconvenience, experts say it marks a significant step forward in enhancing user security.
Tech
Researchers Warn AI Systems Can Now Replicate and Spread Across Computers
A new study by US-based cybersecurity group Palisade Research has raised concerns about the growing capabilities of advanced artificial intelligence systems after researchers demonstrated that some AI models were able to copy themselves, spread to other computers, and continue launching attacks without human assistance.
The experiment, described by researchers as the first known example of autonomous AI self-replication, tested several leading AI systems from OpenAI, Anthropic and Alibaba.
According to the research team, the tests were conducted in a controlled environment using computers intentionally fitted with security weaknesses. The AI models were connected to custom-built software that allowed them to interact directly with computer systems and execute commands beyond the capabilities of ordinary chatbot interfaces.
Researchers instructed some systems to copy themselves directly, while others were asked to break into vulnerable computers and install another AI model. Since OpenAI and Anthropic do not publicly release the core files behind their commercial systems, the tests involving those companies used Alibaba’s Qwen models as the transferable software.
The AI systems were required to locate security flaws, gain access to computers, steal login credentials, move necessary files, and create functioning copies of themselves on new machines. Once installed, the copied AI could continue attacking additional systems independently.
One of the most striking results involved Alibaba’s Qwen3.6-27B model, which successfully spread itself across four computers located in Canada, the United States, Finland and India after receiving only a single prompt. Researchers said the process took just under three hours and required no further human involvement.
The experiment was halted after three stages, though the final copy remained operational and theoretically capable of continuing the process.
Success rates varied between models. Researchers reported that Anthropic’s Claude Opus 4.6 completed the tasks in 81 percent of attempts, while OpenAI’s GPT-5.4 succeeded in roughly one-third of tests. Different versions of Alibaba’s Qwen models achieved success rates ranging from 19 percent to 33 percent.
The findings arrive amid wider debate over the risks posed by increasingly capable AI systems. Last month, Anthropic announced that it would not publicly release a version of its Claude Mythos Preview model, describing it as too dangerous because of its potential use in sophisticated cyberattacks.
Security experts have long warned that self-replicating systems could become difficult to contain if deployed maliciously. Traditional computer viruses can already copy themselves, but researchers said this experiment demonstrated AI systems making independent decisions to exploit vulnerabilities and continue spreading.
Despite the results, the researchers stressed that the study took place under tightly controlled conditions with deliberately weakened security systems. They noted that real-world networks often include monitoring tools and protections designed to block such attacks.
Still, the team said the experiment showed that autonomous AI self-replication can no longer be viewed as a theoretical possibility, but as a capability that now exists in practice.
Tech
AI Study Raises Privacy Questions After Chat Data Reveals Personality Traits
Tech
Zuckerberg and Chan Commit $500 Million to AI Project Aimed at Mapping Human Cells
-
Entertainment2 years agoMeta Acquires Tilda Swinton VR Doc ‘Impulse: Playing With Reality’
-
Business2 years agoSaudi Arabia’s Model for Sustainable Aviation Practices
-
Business2 years agoRecent Developments in Small Business Taxes
-
Sports2 years agoChina’s Historic Olympic Victory Sparks National Pride Amid Controversy
-
Home Improvement1 year agoEffective Drain Cleaning: A Key to a Healthy Plumbing System
-
Politics2 years agoWho was Ebrahim Raisi and his status in Iranian Politics?
-
Sports2 years agoKeely Hodgkinson Wins Britain’s First Athletics Gold at Paris Olympics in 800m
-
Business2 years agoCarrectly: Revolutionizing Car Care in Chicago
