not similar in method, but similar in scope. It shows demonstrates a security tool used for more or less sandboxing apps on microsoft systems has been completely compromised.
So an outside attacker can get your data or control your machine without user interaction? Or does the user have to install their app first? Also does this impact windows phone sandbox apps?