Microsoft has released a new Windows 11 preview build to users in the Dev channel, and naturally, the Start menu and the taskbar, both massively overhauled in this operating system, getting their very own set of improvements. Windows 11 build 22478 therefore includes a fix for the Start menu that prevents the keyboard show more ...
focus from no longer getting lost if you press ESC after opening the user profile flyout. At the same time, Microsoft says it has updated the prompt text when pinning UWP app content to Start, with the new message just reading “Do you want to pin this to Start?”. As far as the taskbar is concerned, the software giant says it has finally addressed the bug that caused a crash of explorer.exe when left and right-clicking the taskbar at the same time. Furthermore, Microsoft says it has resolved the issues with the Notification Center that caused this feature to freeze and then to stop launching completely. Known issues affected the Start menu a... (read more)
The most recent Windows Insider preview build released by Microsoft to the Dev channel includes a new Fluent emoji experience, therefore aligning this feature whose popularity is continuously increasing with the modern touch bundled with the operating system. Announced back in July, this new Fluent emoji also supports show more ...
Unicode emoji up to version 13.1, which means users are also getting new smiley faces as part of this release. And of course, the new and refreshed emoji have been redesigned to look not only fun but also more modern. “Emoji have become part of the way we communicate. Extending our expression by providing humor, feelings, and fun. You will notice we have redesigned all the emoji and introduced some nostalgia for our fans by making the standard paperclip emoji our beloved Clippy! As part of this rollout, we’re adding support for Unicode emoji up to Emoji 13.1 which includes new emoji such as face in the clouds, heart on fire, space with spiral eyes pl... (read more)
WhatsApp already comes with end-to-end encryption for private conversations and calls, but on the other hand, the backups that you create and store in the cloud are exposed. This is why the company announced last month that it’s bringing E2E to these backups as well, no matter if you use an iPhone or an Android show more ...
device. In other words, all your backups will be protected by end-to-end encryption once uploaded to iCloud or Google Drive, so in theory, nobody but you should be able to access their contents. Of course, it also means that you may no longer be able to access your backups if you lose the password. “We’re adding another layer of privacy and security to WhatsApp: an end-to-end encryption option for the backups people choose to store in Google Drive or iCloud. WhatsApp is the first global messaging service at this scale to offer end-to-end encrypted messaging and backups, and getting there was a really hard technical challenge that required an entirely new fr... (read more)
Sony is celebrating five years of PlayStation VR games and to mark the milestone, the Japanese giant has decided to offer PS Plus member three additional PS VR games starting next month. Although the titles haven’t been named yet, judging by the wording, we expect the promotion to continue even after November. show more ...
“Starting in November, PlayStation Plus members will get three PS VR bonus games for no extra charge. Stay tuned for more details in the PlayStation Plus update in the next few weeks.” In the same piece of news, Sony also revealed some data about the PS VR games it released since the launch of the virtual reality headset five years ago. First off, we now know which are the most-played five PlayStation VR games globally: Rec Room, Beat Saber, PlayStation VR Worlds, The Elder Scrolls V: Skyrim VR, and Resident Evil 7 biohazard. Depending on the region, the situation changes slightly. For example, in Europe, top five most-played PlayStation VR games is... (read more)
Solar Ash, the spiritual successor of Hyper Light Drifter from developer Heart Machine, will no longer release in October. Although the game should have been out on PC, PlayStation 4 and PlayStation 5 on October 26, Annapurna Interactive and Heart Machine announced this week they have decided to delay the game. The show more ...
official statement cites time constraints due to the global pandemic, something that many other developers were forced to overcome in the last few years. That being said, Solar Ash now has a new release date: December 2, 2021. “Heart Machine & Annapurna Interactive have decided to delay the release of Solar Ash until December 2, 2021. We want Solar Ash to shine, and we need a bit more time to get the last pieces of polish and bug fixes into the game, while still navigating this global pandemic as a highly dedicated team. This short delay will help us get there.” Unlike their previous Hyper Light Drifter game that was built using 2D pixel art, t... (read more)
Microsoft has released a new Windows 11 preview build to users in the Dev channel, though the changes that it brings are once again minor. In addition to the new Fluent emoji that was announced back in July, Windows 11 build 22478 is all about performance improvements and bug fixes, so overall, Microsoft continues its show more ...
hard work to further polish and refine the experience with the new operating system. Windows 11 was released earlier this month, and the rollout continues as we speak to devices out there, as Microsoft uses an approach based on waves to make sure devices don’t end up hitting critical bugs. Plenty of welcome fixes One important fix in this new Windows 11 build concerns File Explorer, as Microsoft says the file manager should no longer cause massive slowdowns of the device when opening new folders. “Fixed an issue where the command bar was doing unnecessary calculations when navigating to folders, causing an unexpected decrease in pe... (read more)
Microsoft has officially announced what it calls Update Stack Packages, which according to the company, is a new way to improve how Windows devices are being updated by delivering improvements for the update experience before a new patch is deployed. In other words, they are updates for Windows Update that are show more ...
typically shipped before devices are being provided with new operating system updates. Microsoft is already using servicing stack updates, which are exactly what their name suggests: updates supposed to improve the servicing stack – the Windows part responsible for installing updates for the operating system. Microsoft releases new servicing stack updates periodically, so it’ll be interesting to see how the new Update Stack Packages will be different. Currently in testing with limited insiders For the time being, this new approach is only available for a limited number of users in the Dev channel, part of the Windows Insider program. “Curr... (read more)
Microsoft has announced that it’s pulling LinkedIn from China, and the reason is as simple as it could be: the social and sharing component of the platform has made it hard for the company to comply with local requirements, so giving up on the whole thing is pretty much the best way to go. LinkedIn was available in show more ...
China since early 2014, so it made its debut in the country some two years prior to the Microsoft acquisition. While no big change was released for the localized version of LinkedIn in China after the software giant purchased the platform, Microsoft now says that dealing with the local requirements is hard if the final goal is to keep the scope of LinkedIn unaltered. “While we’ve found success in helping Chinese members find jobs and economic opportunity, we have not found that same level of success in the more social aspects of sharing and staying informed. We’re also facing a significantly more challenging operating environment and greater compliance ... (read more)
Intel has made available a new DCH graphics package targeted at several of its CPUs, namely version 30.0.100.9955, which includes H264 and HEVC DX12 video encode support on Microsoft Windows 11 for 10th Generation Core CPUs with Iris Plus graphics and higher. In addition to that, the 9955 build resolves minor graphic show more ...
anomalies seen in Cyberpunk 2077, Hitman 2, Euro Truck Simulator 2, Marvel’s Avengers, Metro Exodus, Wolfenstein: Youngblood, Monster Jam Steel Titans 2, and Ark Survival Evolved titles. Besides these changes, Intel makes sure no crash/hangs are encountered in Ark: Survival Evolved (during launch), Star Wars: Squadrons (during launch), and Warframe, and implements other changes as highlighted in the Release Notes below. In terms of compatibility, the current update is targeted at Intel’s 11th, 10th, 9th, 8th, 7th, and 6th Generation Core processors, at Atom, Pentium, and Celeron processor family, at Core CPUs with Hybrid Technology, as well as at Iris... (read more)
One step backward, pivot, pivot again, stop to think a little. My character is holding on to an asymmetric stack of crates (one is not like the others) that defies gravity. While he stands still, I am thinking about how to move it into position so I can take one element and then make it into a step to finally reach a show more ...
fire. Once I am there, I will turn some objects linked to my past into smoke and heat. I am not entirely sure why. Bonfire Peaks was created by Corey Martin and is published by Draknek & Friends, on the PC using Steam, the Nintendo Switch, the PlayStation 5 and 4. The title is built around puzzle mechanics and a story that touches on the meaning of loss and survival. The unnamed protagonist is very determined to carry a crate of his things into a fire. It’s hard to know exactly what he’s carrying, or why the bonfires are all strewn across a mountain. Some hints about his past emerge as the peak approaches. Everything is clearly a metaphor for loss and ... (read more)
A recent review of five entry-level mobile phones retailing for about $10–$20 examined their security in detail. Commonly referred to as “feature phones” or “granny phones” — and often procured for elderly relatives either unwilling or unable to get used to smartphones — such phones can show more ...
also be “just in case” spares. Some people also believe they are safer than Android-powered smartphones. Well, the reviewer refuted that last bit. He discovered hidden functions in four out of the five phones: Two transmit data at first power up (leaking the new owner’s personal information), and the other two not only leak private data, but can also subscribe the user to paid content by secretly communicating over the Internet with a command server. Infected granny phones The study author offers information about the methods used to analyze these simple devices’ firmware, the technicalities of which may be interesting to those willing to repeat the same analysis. However, let’s get straight to the findings. Out of the five phones, two send the user’s data somewhere the first time they’re powered on. To whom the data goes — manufacturer, distributor, firmware developer, or somebody else — is not clear. Neither is it clear how the data may be used. It could be assumed that such data might be useful to monitor sales or control the distribution of batches of products in different countries. To be clear, it doesn’t sound very dangerous; and after all, every smartphone transmits some telemetry data. Remember, however, that all major smartphone manufacturers at least try to anonymize the data they collect, and its destination is usually more or less clear. In this case, however, nothing is known about who is collecting owners’ sensitive information without their consent. For example, one of the phones transmits not only its serial number, country of activation, firmware info, and language, but also the base station identifier, handy for establishing the user’s approximate location. Moreover, the server collecting the data has no protection whatsoever, so the information is basically up for grabs. One more subtlety: The transmission takes place over the Internet. To be clear, a feature phone user may not even be aware that the device can go online. So, apart from anything else, the covert actions may result in surprise mobile traffic charges. Another phone from the review group, apart from leaking user data, was programmed to steal money from its owner. According to firmware analysis, the phone contacted the command server over the Internet and executed its instructions, including sending hidden text messages to paid numbers. The next phone model had even more advanced malicious functionality. According to one actual phone user, a total stranger used the phone number to sign up for Telegram. How could that have happened? Signing up for almost any messaging app means providing a phone number to which a confirmation code is sent by SMS. It seems, however, the phone can intercept this message and forward the confirmation code to a C&C server, all the while concealing the activity from the owner. Whereas the previous examples involved little more than unforeseen expense, this scenario threatens real legal problems, for example should the account be used for any criminal activities. What should I do now that I know push-button phones are unsafe? The difference between modern low-end phones and their counterparts of 10 years ago is that now, even dirt-cheap circuitry can include Internet access. Even with an otherwise clean device, this may prove an unpleasant discovery: a phone chosen specifically for its inability to connect to the Internet goes online anyway. Earlier, the same researcher analyzed another push-button phone. Although he found no malicious functionality, the device had a menu of paid subscriptions for horoscopes and demo games, the full versions of which the user could unlock — and pay for — with a text. In other words, your elderly relative or child could press the wrong button on a phone purchased specifically for its lack of Internet and apps and end up paying for the mistake. What makes this “infected” mobiles story important is that it’s often the manufacturer or a dealer back in China adding the “extra features,” so local distributors may not even be aware of the problem. Another complicating factor is that push-button phones come in small batches in a multitude of different models, and it is hard to tell a normal phone from a compromised one, unless one can thoroughly investigate firmware. Clearly, not all distributors can afford adequate firmware control. It might be easier just to buy a smartphone. Of course, that depends on budget, and unfortunately, cheaper smartphones may have similar malware issues. But if you can afford one — even a very simple one — from a major manufacturer, it could prove a safer choice, especially if your reason for choosing a push-button device is that you’re looking for something simple, reliable, and free of hidden functions. You can mitigate Android risks with a reliable antivirus app; feature phones offer no such control. As for elderly relatives, if they’re used to answering calls by opening their flip phone, adapting to a touch screen may prove next to impossible, but upgrading is worth a try in our opinion. Plenty of older folks have switched to smartphones easily enough and can now happily experience the wide world of mobile computing.
The countries involved in the two-day ransomware summit led by the US have released a joint statement pledging to make systems more resilient against attack and outlining measures that will be taken to disrupt the criminal groups involved.
Over 130 different ransomware families have been found to be active in 2020 and the first half of 2021, with Israel, South Korea, Vietnam, China, Singapore, India, Kazakhstan, Philippines, Iran, and the U.K. emerging as the most affected territories.
Researchers at Cider Security have uncovered a security loophole in GitHub Actions that allows adversaries to bypass the required reviews mechanism and push non-reviewed code to a protected branch, allowing it into the pipeline to production.
A large-scale unauthenticated scraping of publicly available and non-secured endpoints from older versions of Prometheus event monitoring and alerting solution could be leveraged to inadvertently leak sensitive information.
More than a dozen prominent cybersecurity experts raised concerns on plans by Apple and the EU to monitor people’s phones for illicit material, calling the efforts ineffective and dangerous strategies that would embolden government surveillance.
The University of Sunderland in the United Kingdom has announced extensive operational issues that have taken most of its IT systems down, attributing the problem to a cyber-attack.
Researchers at Imperva uncovered a new ad injection campaign based on an adblocker named AllBlock. The AllBlock extension was available at the time of writing for Chrome and Opera in the respective web stores.
Multiple flaws have been disclosed in softphone software from Linphone and MicroSIP that could be exploited by an unauthenticated remote adversary to crash the client and even extract sensitive information by simply making a malicious call.
The Japanese manufacturer of optics and reprography products said that suspicious activity was spotted on October 10. The possible threat is affecting the company's systems in the United States, Canada, and Latin America.
WhatsApp has said it is starting to slowly roll out the encrypted backups feature it detailed in September. Users will have a choice for how the encryption key used is stored.
HP released its latest Wolf Security Threat Insights Report, finding evidence that cybercriminals are moving even faster in taking advantage of zero-day vulnerabilities targeting the MSHTML browser engine through Microsoft Office documents.
Google’s Threat Analysis Group outlined the novel technique as part of a broader look at APT35, a state-sponsored group that has spent the last several years trying to get high-value targets to click on the wrong link and cough up their credentials.
As reported by Avanan researchers, half of all phishing emails they analyzed in recent months impersonated non-executives, and 77% of them targeted employees on the same level.
The American Osteopathic Association has just begun notifying nearly 28,000 individuals about a June 2020 data exfiltration incident involving their personal information.
The company came forward and confirmed the attack in a Twitter thread, writing that it was "aware of an issue in which some member accounts were accessed and/or charged without their authorization."
Cybersecurity company Dragos worked with CISA, the FBI, the NSA and the EPA to outline cyberthreats targeting the information and operational technology underpinning the networks, systems and devices of US water and wastewater facilities.
OpenSea, the world’s largest NFT marketplace, has addressed a security vulnerability that could have allowed hackers to hijack user accounts and empty their crypto wallets with the help of maliciously crafted NFTs (non-fungible tokens).
The long-running botnet known as MyKings is still in business and has raked in at least $24.7 million by using its network of compromised computers to mine for cryptocurrencies.
Trustwave, a Chicago-based cybersecurity and managed security services provider owned by Singaporean telecommunications company Singtel Group Enterprise, on Friday announced the release of the free decryptor, available for download from GitHub.
Ubuntu Security Notice 5091-3 - USN-5091-1 fixed vulnerabilities in Linux 5.4-based kernels. Unfortunately, for Linux kernels intended for use within Microsoft Azure environments, that update introduced a regression that could cause the kernel to fail to boot in large Azure instance types. This update fixes the problem. Various other issues were also addressed.
Red Hat Security Advisory 2021-3873-01 - Red Hat Advanced Cluster Management for Kubernetes 2.2.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private show more ...
cloud environments. Clusters and applications are all visible and managed from a single console — with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide bug fixes and security fixes. Issues addressed include bypass, denial of service, integer overflow, and out of bounds read vulnerabilities.
Red Hat Security Advisory 2021-3874-01 - Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to show more ...
write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.
Red Hat Security Advisory 2021-3872-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.
Red Hat Security Advisory 2021-3871-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.
The operators behind the pernicious TrickBot malware have resurfaced with new tricks that aim to increase its foothold by expanding its distribution channels, ultimately leading to the deployment of ransomware such as Conti. The threat actor, tracked under the monikers ITG23 and Wizard Spider, has been found to partner with other cybercrime gangs known Hive0105, Hive0106 (aka TA551 or Shathak),
A new deceptive ad injection campaign has been found leveraging an ad blocker extension for Google Chrome and Opera web browsers to sneakily insert ads and affiliate codes on websites, according to new research from cybersecurity firm Imperva. The findings come following the discovery of rogue domains distributing an ad injection script in late August 2021 that the researchers connected to an
The U.S. Cybersecurity Infrastructure and Security Agency (CISA) on Thursday warned of continued ransomware attacks aimed at disrupting water and wastewater facilities (WWS), highlighting five incidents that occurred between March 2019 and August 2021. "This activity—which includes attempts to compromise system integrity via unauthorized access—threatens the ability of WWS facilities to provide
Hardware and electronics giant Acer has suffered a data breach, with hackers claiming they have stolen 60GB worth of files from the company's Indian servers.
Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! Strong identity authentication is more important than ever as organizations face an unprecedented level of attacks targeting their dynamic and remote ecosystem of employees, partners, show more ...
and customers. An intelligence-driven approach to identity … Continue reading "Disrupt adversaries and prevent identity fraud with Recorded Future Identity Intelligence"