Skip to main content

Hitting ‘Check for updates’ in Windows 10 opts you into beta releases

Windows 10 has already been plagued with update problems, and now another issue has arisen. Users who are careful about keeping their system updated should watch out — Microsoft revealed this week that clicking the “Check for updates” button in Windows can opt you in to testing beta code.

Windows typically downloads updates automatically, but fastidious users can also hit the Check for updates button in the Windows Update section of the Settings panel in Windows 10 to manually check for any changes to Windows. This is useful when you are performing system maintenance or if you’re working from a freshly installed copy of Windows. It is also something that security-minded techies have drilled into the heads of less tech-savvy users: that updates are important, and that you should regularly check whether all of your software is up to date.

Recommended Videos

But now Microsoft has shared a blog post in which they argue that people who click the Check for updates button are in fact “advanced users” who are “seeking updates.” Therefore, if you click the button, your system will be updated to the latest optional release called “C” or “D” release. These releases are a kind of preview of the next regular monthly release, known as the “B” release, which is the general version which includes security and non-security fixes.

The problem is that these C and D releases are still essentially beta code which is being offered for preview rather than being intended for widespread use. Microsoft says that the releases are “validated, production-quality optional releases,” but also that they are intended “primarily for commercial customers and advanced users ‘seeking’ updates.” This distinction is not made clear in the updates section of Windows, and you can imagine plenty of regular people clicking the Check for updates button in their system because they think it’s good security practice, without realizing that they have essentially opted into Windows beta testing.

Microsoft has had problems with their patches in the past, such as a patch for Surface Book 2 devices that caused a blue screen of death error. As PCWorld points out, the timing of this patch in the last week of November means that it would have been issued to users who hit the Check for updates button. So Windows users beware: stay away from the Check for updates button unless you know what you’re doing.

Georgina Torbet
Georgina has been the space writer at Digital Trends space writer for six years, covering human space exploration, planetary…
Microsoft backs off on pressuring Windows 10 users to upgrade
Windows 11 and Windows 10 operating system logos are displayed on laptop screens.

Microsoft has announced that it will ease up the aggressive add tactic to get Windows 10 users to upgrade to Windows 11 after receiving negative backlash from users, as Windows Latest reports. There is no official word on whether stopping the full-screen multipage popups is permanent, but a plan to “share a new timeline in the coming months” was mentioned.

Windows 10 Home users saw these ads, but some Pro and Business users also saw them after rebooting their computers. Regardless of who saw them, the ads’ pause comes as the Windows 10 end-of-life date, October 14, 2025, approaches.

Read more
You definitely want to install these 90 Windows security patches
Microsoft Surface Laptop Go 3 rear view showing lid and logo.

Microsoft has issued security updates to address 90 vulnerabilities, some of which hackers are actively exploiting, in a blog post yesterday. These flaws allow hackers to bypass security features and gain unauthorized access to your PC's system, highlighting the need to keep your Windows computer updated.

Nine are rated Critical, 80 of the flaws are rated Important, and only one is rated Moderate in severity. In addition, the software giant has patched 36 vulnerabilities in its Edge browser in the past month to avoid issues with its browser. Users will be happy to know that the patches are for six actively exploited zero-days, including CVE-2024-38213. This lets attackers bypass SmartScreen protections but requires the user to open a malicious file. TrendMicro's Peter Girnus, who discovered and reported the flaw, proposed it could be a workaround for CVE-2023-36025 or CVE-2024-21412 that DarkGate malware operators misused.

Read more
This Windows Update exploit is downright terrifying
Windows Update running on a laptop.

Windows Update may occasionally backfire with faulty patches, but for the most part, it's meant to keep us safe from the latest threats. Microsoft regularly pushes new patches that address potential vulnerabilities. But what if there were a tool that could undo every Windows Update and leave your PC exposed to all the threats Microsoft thought it had already fixed? Bad news: Such a tool now exists, and it's called Windows Downdate.

Don't worry, though. You're safe from Windows Downdate -- at least for now. The tool was developed as a proof-of-concept by SafeBreach researcher Alon Leviev, and although its potential is nothing short of terrifying, it was made in good faith as an example of something called "white-hat hacking," where researchers try to find vulnerabilities before malicious threat actors can do it first.

Read more