Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Windows 11 Start Men ...

 Windows

Microsoft has released a new Windows 11 preview build to users in the Dev channel, and naturally, the Start menu and the taskbar, both massively overhauled in this operating system, getting their very own set of improvements. Windows 11 build 22478 therefore includes a fix for the Start menu that prevents the keyboard   show more ...

focus from no longer getting lost if you press ESC after opening the user profile flyout. At the same time, Microsoft says it has updated the prompt text when pinning UWP app content to Start, with the new message just reading “Do you want to pin this to Start?”. As far as the taskbar is concerned, the software giant says it has finally addressed the bug that caused a crash of explorer.exe when left and right-clicking the taskbar at the same time. Furthermore, Microsoft says it has resolved the issues with the Notification Center that caused this feature to freeze and then to stop launching completely. Known issues affected the Start menu a... (read more)

image for Windows 11 Finally G ...

 Windows

The most recent Windows Insider preview build released by Microsoft to the Dev channel includes a new Fluent emoji experience, therefore aligning this feature whose popularity is continuously increasing with the modern touch bundled with the operating system. Announced back in July, this new Fluent emoji also supports   show more ...

Unicode emoji up to version 13.1, which means users are also getting new smiley faces as part of this release. And of course, the new and refreshed emoji have been redesigned to look not only fun but also more modern. “Emoji have become part of the way we communicate. Extending our expression by providing humor, feelings, and fun. You will notice we have redesigned all the emoji and introduced some nostalgia for our fans by making the standard paperclip emoji our beloved Clippy! As part of this rollout, we’re adding support for Unicode emoji up to Emoji 13.1 which includes new emoji such as face in the clouds, heart on fire, space with spiral eyes pl... (read more)

image for WhatsApp Starts Roll ...

 Web / Internet Life

WhatsApp already comes with end-to-end encryption for private conversations and calls, but on the other hand, the backups that you create and store in the cloud are exposed. This is why the company announced last month that it’s bringing E2E to these backups as well, no matter if you use an iPhone or an Android   show more ...

device. In other words, all your backups will be protected by end-to-end encryption once uploaded to iCloud or Google Drive, so in theory, nobody but you should be able to access their contents. Of course, it also means that you may no longer be able to access your backups if you lose the password. “We’re adding another layer of privacy and security to WhatsApp: an end-to-end encryption option for the backups people choose to store in Google Drive or iCloud. WhatsApp is the first global messaging service at this scale to offer end-to-end encrypted messaging and backups, and getting there was a really hard technical challenge that required an entirely new fr... (read more)

image for PlayStation Plus Mem ...

 Play Station

Sony is celebrating five years of PlayStation VR games and to mark the milestone, the Japanese giant has decided to offer PS Plus member three additional PS VR games starting next month. Although the titles haven’t been named yet, judging by the wording, we expect the promotion to continue even after November.   show more ...

“Starting in November, PlayStation Plus members will get three PS VR bonus games for no extra charge. Stay tuned for more details in the PlayStation Plus update in the next few weeks.” In the same piece of news, Sony also revealed some data about the PS VR games it released since the launch of the virtual reality headset five years ago. First off, we now know which are the most-played five PlayStation VR games globally: Rec Room, Beat Saber, PlayStation VR Worlds, The Elder Scrolls V: Skyrim VR, and Resident Evil 7 biohazard. Depending on the region, the situation changes slightly. For example, in Europe, top five most-played PlayStation VR games is... (read more)

image for PlayStation Console  ...

 Games

Solar Ash, the spiritual successor of Hyper Light Drifter from developer Heart Machine, will no longer release in October. Although the game should have been out on PC, PlayStation 4 and PlayStation 5 on October 26, Annapurna Interactive and Heart Machine announced this week they have decided to delay the game. The   show more ...

official statement cites time constraints due to the global pandemic, something that many other developers were forced to overcome in the last few years. That being said, Solar Ash now has a new release date: December 2, 2021. “Heart Machine & Annapurna Interactive have decided to delay the release of Solar Ash until December 2, 2021. We want Solar Ash to shine, and we need a bit more time to get the last pieces of polish and bug fixes into the game, while still navigating this global pandemic as a highly dedicated team. This short delay will help us get there.” Unlike their previous Hyper Light Drifter game that was built using 2D pixel art, t... (read more)

image for Microsoft Releases a ...

 Windows

Microsoft has released a new Windows 11 preview build to users in the Dev channel, though the changes that it brings are once again minor. In addition to the new Fluent emoji that was announced back in July, Windows 11 build 22478 is all about performance improvements and bug fixes, so overall, Microsoft continues its   show more ...

hard work to further polish and refine the experience with the new operating system. Windows 11 was released earlier this month, and the rollout continues as we speak to devices out there, as Microsoft uses an approach based on waves to make sure devices don’t end up hitting critical bugs. Plenty of welcome fixes One important fix in this new Windows 11 build concerns File Explorer, as Microsoft says the file manager should no longer cause massive slowdowns of the device when opening new folders. “Fixed an issue where the command bar was doing unnecessary calculations when navigating to folders, causing an unexpected decrease in pe... (read more)

image for Microsoft Announces  ...

 Windows

Microsoft has officially announced what it calls Update Stack Packages, which according to the company, is a new way to improve how Windows devices are being updated by delivering improvements for the update experience before a new patch is deployed. In other words, they are updates for Windows Update that are   show more ...

typically shipped before devices are being provided with new operating system updates. Microsoft is already using servicing stack updates, which are exactly what their name suggests: updates supposed to improve the servicing stack – the Windows part responsible for installing updates for the operating system. Microsoft releases new servicing stack updates periodically, so it’ll be interesting to see how the new Update Stack Packages will be different. Currently in testing with limited insiders For the time being, this new approach is only available for a limited number of users in the Dev channel, part of the Windows Insider program. “Curr... (read more)

image for LinkedIn Is Leaving  ...

 Microsoft

Microsoft has announced that it’s pulling LinkedIn from China, and the reason is as simple as it could be: the social and sharing component of the platform has made it hard for the company to comply with local requirements, so giving up on the whole thing is pretty much the best way to go. LinkedIn was available in   show more ...

China since early 2014, so it made its debut in the country some two years prior to the Microsoft acquisition. While no big change was released for the localized version of LinkedIn in China after the software giant purchased the platform, Microsoft now says that dealing with the local requirements is hard if the final goal is to keep the scope of LinkedIn unaltered. “While we’ve found success in helping Chinese members find jobs and economic opportunity, we have not found that same level of success in the more social aspects of sharing and staying informed. We’re also facing a significantly more challenging operating environment and greater compliance ... (read more)

image for Intel HD Graphics 30 ...

 Hardware & Drivers Blog

Intel has made available a new DCH graphics package targeted at several of its CPUs, namely version 30.0.100.9955, which includes H264 and HEVC DX12 video encode support on Microsoft Windows 11 for 10th Generation Core CPUs with Iris Plus graphics and higher. In addition to that, the 9955 build resolves minor graphic   show more ...

anomalies seen in Cyberpunk 2077, Hitman 2, Euro Truck Simulator 2, Marvel’s Avengers, Metro Exodus, Wolfenstein: Youngblood, Monster Jam Steel Titans 2, and Ark Survival Evolved titles. Besides these changes, Intel makes sure no crash/hangs are encountered in Ark: Survival Evolved (during launch), Star Wars: Squadrons (during launch), and Warframe, and implements other changes as highlighted in the Release Notes below. In terms of compatibility, the current update is targeted at Intel’s 11th, 10th, 9th, 8th, 7th, and 6th Generation Core processors, at Atom, Pentium, and Celeron processor family, at Core CPUs with Hybrid Technology, as well as at Iris... (read more)

image for Bonfire Peaks Review ...

 Game reviews

One step backward, pivot, pivot again, stop to think a little. My character is holding on to an asymmetric stack of crates (one is not like the others) that defies gravity. While he stands still, I am thinking about how to move it into position so I can take one element and then make it into a step to finally reach a   show more ...

fire. Once I am there, I will turn some objects linked to my past into smoke and heat. I am not entirely sure why. Bonfire Peaks was created by Corey Martin and is published by Draknek & Friends, on the PC using Steam, the Nintendo Switch, the PlayStation 5 and 4. The title is built around puzzle mechanics and a story that touches on the meaning of loss and survival. The unnamed protagonist is very determined to carry a crate of his things into a fire. It’s hard to know exactly what he’s carrying, or why the bonfires are all strewn across a mountain. Some hints about his past emerge as the peak approaches. Everything is clearly a metaphor for loss and ... (read more)

image for Feature phones can b ...

 Threats

A recent review of five entry-level mobile phones retailing for about $10–$20 examined their security in detail. Commonly referred to as “feature phones” or “granny phones” — and often procured for elderly relatives either unwilling or unable to get used to smartphones — such phones can   show more ...

also be “just in case” spares. Some people also believe they are safer than Android-powered smartphones. Well, the reviewer refuted that last bit. He discovered hidden functions in four out of the five phones: Two transmit data at first power up (leaking the new owner’s personal information), and the other two not only leak private data, but can also subscribe the user to paid content by secretly communicating over the Internet with a command server. Infected granny phones The study author offers information about the methods used to analyze these simple devices’ firmware, the technicalities of which may be interesting to those willing to repeat the same analysis. However, let’s get straight to the findings. Out of the five phones, two send the user’s data somewhere the first time they’re powered on. To whom the data goes — manufacturer, distributor, firmware developer, or somebody else — is not clear. Neither is it clear how the data may be used. It could be assumed that such data might be useful to monitor sales or control the distribution of batches of products in different countries. To be clear, it doesn’t sound very dangerous; and after all, every smartphone transmits some telemetry data. Remember, however, that all major smartphone manufacturers at least try to anonymize the data they collect, and its destination is usually more or less clear. In this case, however, nothing is known about who is collecting owners’ sensitive information without their consent. For example, one of the phones transmits not only its serial number, country of activation, firmware info, and language, but also the base station identifier, handy for establishing the user’s approximate location. Moreover, the server collecting the data has no protection whatsoever, so the information is basically up for grabs. One more subtlety: The transmission takes place over the Internet. To be clear, a feature phone user may not even be aware that the device can go online. So, apart from anything else, the covert actions may result in surprise mobile traffic charges. Another phone from the review group, apart from leaking user data, was programmed to steal money from its owner. According to firmware analysis, the phone contacted the command server over the Internet and executed its instructions, including sending hidden text messages to paid numbers. The next phone model had even more advanced malicious functionality. According to one actual phone user, a total stranger used the phone number to sign up for Telegram. How could that have happened? Signing up for almost any messaging app means providing a phone number to which a confirmation code is sent by SMS. It seems, however, the phone can intercept this message and forward the confirmation code to a C&C server, all the while concealing the activity from the owner. Whereas the previous examples involved little more than unforeseen expense, this scenario threatens real legal problems, for example should the account be used for any criminal activities. What should I do now that I know push-button phones are unsafe? The difference between modern low-end phones and their counterparts of 10 years ago is that now, even dirt-cheap circuitry can include Internet access. Even with an otherwise clean device, this may prove an unpleasant discovery: a phone chosen specifically for its inability to connect to the Internet goes online anyway. Earlier, the same researcher analyzed another push-button phone. Although he found no malicious functionality, the device had a menu of paid subscriptions for horoscopes and demo games, the full versions of which the user could unlock — and pay for — with a text. In other words, your elderly relative or child could press the wrong button on a phone purchased specifically for its lack of Internet and apps and end up paying for the mistake. What makes this “infected” mobiles story important is that it’s often the manufacturer or a dealer back in China adding the “extra features,” so local distributors may not even be aware of the problem. Another complicating factor is that push-button phones come in small batches in a multitude of different models, and it is hard to tell a normal phone from a compromised one, unless one can thoroughly investigate firmware. Clearly, not all distributors can afford adequate firmware control. It might be easier just to buy a smartphone. Of course, that depends on budget, and unfortunately, cheaper smartphones may have similar malware issues. But if you can afford one — even a very simple one — from a major manufacturer, it could prove a safer choice, especially if your reason for choosing a push-button device is that you’re looking for something simple, reliable, and free of hidden functions. You can mitigate Android risks with a reliable antivirus app; feature phones offer no such control. As for elderly relatives, if they’re used to answering calls by opening their flip phone, adapting to a touch screen may prove next to impossible, but upgrading is worth a try in our opinion. Plenty of older folks have switched to smartphones easily enough and can now happily experience the wide world of mobile computing.

 Malware and Vulnerabilities

Researchers at Cider Security have uncovered a security loophole in GitHub Actions that allows adversaries to bypass the required reviews mechanism and push non-reviewed code to a protected branch, allowing it into the pipeline to production.

 Malware and Vulnerabilities

Researchers at Imperva uncovered a new ad injection campaign based on an adblocker named AllBlock. The AllBlock extension was available at the time of writing for Chrome and Opera in the respective web stores.

 Breaches and Incidents

The Japanese manufacturer of optics and reprography products said that suspicious activity was spotted on October 10. The possible threat is affecting the company's systems in the United States, Canada, and Latin America.

 Threat Actors

Google’s Threat Analysis Group outlined the novel technique as part of a broader look at APT35, a state-sponsored group that has spent the last several years trying to get high-value targets to click on the wrong link and cough up their credentials.

 Malware and Vulnerabilities

Trustwave, a Chicago-based cybersecurity and managed security services provider owned by Singaporean telecommunications company Singtel Group Enterprise, on Friday announced the release of the free decryptor, available for download from GitHub.

 Feed

Ubuntu Security Notice 5091-3 - USN-5091-1 fixed vulnerabilities in Linux 5.4-based kernels. Unfortunately, for Linux kernels intended for use within Microsoft Azure environments, that update introduced a regression that could cause the kernel to fail to boot in large Azure instance types. This update fixes the problem. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2021-3873-01 - Red Hat Advanced Cluster Management for Kubernetes 2.2.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private   show more ...

cloud environments. Clusters and applications are all visible and managed from a single console — with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide bug fixes and security fixes. Issues addressed include bypass, denial of service, integer overflow, and out of bounds read vulnerabilities.

 Feed

Red Hat Security Advisory 2021-3874-01 - Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to   show more ...

write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.

 Feed

Red Hat Security Advisory 2021-3872-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.

 Feed

Red Hat Security Advisory 2021-3871-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.

 Feed

The operators behind the pernicious TrickBot malware have resurfaced with new tricks that aim to increase its foothold by expanding its distribution channels, ultimately leading to the deployment of ransomware such as Conti. The threat actor, tracked under the monikers ITG23 and Wizard Spider, has been found to partner with other cybercrime gangs known Hive0105, Hive0106 (aka TA551 or Shathak),

 Feed

A new deceptive ad injection campaign has been found leveraging an ad blocker extension for Google Chrome and Opera web browsers to sneakily insert ads and affiliate codes on websites, according to new research from cybersecurity firm Imperva. The findings come following the discovery of rogue domains distributing an ad injection script in late August 2021 that the researchers connected to an

 Feed

The U.S. Cybersecurity Infrastructure and Security Agency (CISA) on Thursday warned of continued ransomware attacks aimed at disrupting water and wastewater facilities (WWS), highlighting five incidents that occurred between March 2019 and August 2021. "This activity—which includes attempts to compromise system integrity via unauthorized access—threatens the ability of WWS facilities to provide

 Feed only

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! Strong identity authentication is more important than ever as organizations face an unprecedented level of attacks targeting their dynamic and remote ecosystem of employees, partners,   show more ...

and customers. An intelligence-driven approach to identity … Continue reading "Disrupt adversaries and prevent identity fraud with Recorded Future Identity Intelligence"

2021-10
Aggregator history
Friday, October 15
FRI
SAT
SUN
MON
TUE
WED
THU
OctoberNovemberDecember