
Microsoft Is Testing Letting Copilot AI Interact With Your Whole Desktop
The company said Tuesday that this expansion of Copilot's Vision capabilities has begun public testing. This update, now rolling out to the company's Windows Insider program testers, will allow the AI chatbot to view, process and react to all aspects of a user's desktop, where beforehand it was limited to specific apps or windows.
With this update in place, Copilot should be to process and react to multiple windows and apps at the same time. Microsoft touted the ability for it to assist with all aspects of a project you might be working on.
The Vision feature can be activated by selecting the "glasses" icon and selecting which desktop you'd like to share, and can be closed out by hitting "Stop" or "X" in the composer.
"When you share your desktop (or any specific browser or app window), Copilot can see what you see and talk to you about it in real time," Microsoft's blog post said. "It can help analyze content, provide insights, and answer your questions, coaching you through it aloud. Get tips on making improvements to your creative project, help with improving your resume, or guidance while navigating a new game."
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
35 minutes ago
- Yahoo
Mark Cuban says the AI war ‘will get ugly' and intellectual property ‘is KING' in the AI world
Major tech companies are battling for AI dominance, pouring tens of billions into infrastructure and offering sky-high compensation packages. Billionaire investor Mark Cuban notes this new phase will see firms locking down valuable AI innovations and expertise rather than sharing them. Major tech companies are in a fierce competition to be at the forefront of AI by recruiting top talent, massively investing in research and development and infrastructure, and scooping up smaller startups left and right. This so-called AI war is about to become even more aggressive. 'What people are missing about AI, [in my opinion], is no company is going to spend what will end up being more than a trillion dollars and accept not being dominant,' Mark Cuban wrote Sunday on X. 'They will find a way to battle. I don't know how, other than to guess it will get ugly.' Tech giants like Meta, Google, Microsoft, and Apple have been ferociously recruiting top AI talent—and dishing out enormous pay packages to poach them. Top-tier AI researchers at Meta are reportedly being offered total compensation packages of up to $300 million over four years, with some first-year earnings over $100 million. One example was a former Apple executive Ruoming Pang, who Bloomberg reported is joining Meta's 'Superintelligence' team for $200 million. In January, Microsoft announced it was investing about $80 billion this year alone on developing data centers to train AI models and deploy cloud-based applications. An AI researcher at Microsoft makes about $431,000, on average, according to Several job-posting sites show the average salary for a software engineer is roughly $125,000, so these so-called AI researchers are making more than three times a software engineer—a job that's long been regarded as one of the most lucrative in tech. Google has also invested about $75 billion in AI this year, and recently announced another $25 billion investment to build new AI data centers. Nvidia is also a clear frontrunner in hardware powering AI, and some research scientists there reportedly make more than $600,000. 'We are seeing them hire away talent and [intellectual property] to build [and] advance their models,' Cuban wrote. 'But that's just the beginning.' Cuban predicts major tech companies will also start shelling out more to 'lock up' the IP they think their models need to keep it from their competitors. 'The days of publish or perish are probably over,' Cuban wrote. 'It's now publish, and its value perishes, because it got eaten up by every foundational model.' He suggests the companies that develop valuable IP for AI should encrypt it and silo it.'IP is KING in an AI world,' Cuban added. 'The times they are a changing.' This story was originally featured on Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data
Yahoo
an hour ago
- Yahoo
ExpressVPN patches Windows bug that exposed remote desktop traffic
Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products. ExpressVPN has released a new patch for its Windows app to close a vulnerability that can leave remote desktop traffic unprotected. If you use ExpressVPN on Windows, download version 12.101.0.45 as soon as possible, especially if you use Remote Desktop Protocol (RDP) or any other traffic through TCP port 3389. ExpressVPN announced both the vulnerability and the fix in a blog post earlier this week. According to that post, an independent researcher going by Adam-X sent in a tip on April 25 to claim a reward from ExpressVPN's bug bounty program. Adam-X noticed that some internal debug code which left traffic on TCP port 3389 unprotected had mistakenly shipped to customers. ExpressVPN released the patch about five days later in version 12.101.0.45 for Windows. As ExpressVPN points out in its announcement of the patch, it's unlikely that the vulnerability was actually exploited. Any hypothetical hacker would not only have to be aware of the flaw, but would then have to trick their target into sending a web request over RDP or other traffic that uses port 3389. Even if all the dominos fell, the hacker could only see their target's real IP address, not any of the actual data they transmitted. Even if the danger was small, it's nice to see ExpressVPN responding proactively to flaws in its product — bug bounties are great, but a security product should protect its users with as many safeguards as possible. In addition to closing this vulnerability, they're also adding automated tests that check for debug code accidentally left in production builds. This, plus a successful independent privacy audit earlier in 2025, gives the strong impression of a provider that's on top of things.


CNBC
an hour ago
- CNBC
Microsoft server hack has now hit 400 victims, researchers say
A sweeping cyber-espionage campaign organization centered on vulnerable versions of Microsoft's server software has now claimed about 400 victims, according to researchers at Netherlands-based Eye Security. The figure, which is derived from a count of digital artifacts discovered during scans of servers running vulnerable versions of Microsoft's SharePoint software, compares to 100 organizations cataloged over the weekend. Eye Security says the figure is likely an undercount. "There are many more, because not all attack vectors have left artifacts that we could scan for," said Vaisha Bernard, the chief hacker for Eye Security, which was among the first organizations to flag the breaches. The details of most of the victim organizations have not yet been fully disclosed, but on Wednesday a representative for the National Institutes of Health confirmed that one of the organization's servers had been compromised. "Additional servers were isolated as a precaution," he said. The news of the compromise was first reported by the Washington Post. The spy campaign kicked off after Microsoft failed to fully patch a security hole in its SharePoint server software, kicking off a scramble to fix the vulnerability when it was discovered. Microsoft and its tech rival, Google owner Alphabet, have both said Chinese hackers are among those taking advantage of the flaw. Beijing has denied the claim.