Windows 10 News and info | Forum
November 12, 2019, Loading... *
Welcome, Guest. Please login or register.

Login with username, password and session length
News: This is a clean Ad-free Forum and protected by StopForumSpam, Project Honeypot, Botscout and AbuseIPDB | This forum does not use audio ads, popups, or other annoyances. New member registration currently disabled.
 
  Website   Home   Windows 8 Website GDPR Help Login Register  
By continuing to use the site or forum, you agree to the use of cookies, find out more by reading our GDPR policy.
Pages: 1 [2] 3 4 ... 10
 11 
 on: November 09, 2019, 06:42:27 PM 
Started by javajolt - Last post by javajolt
Today's release brings the SDK preview in line with a Fast Ring build that released last week.

Microsoft pushed out another update to the Windows 10 SDK preview today. Developers can now get their hands on SDK preview build 18999, which is the same build number as a recent release Windows 10 Insiders on the Fast ring that shipped last week. The latest SDK preview is available to download now from the Windows Insider website.

The release notes for this build are the same as they have been for previous builds. Here's a recap:

Tools updates

Quote
Message Compiler (mc.exe)

   ○ Now detects the Unicode byte order mark (BOM) in .mc files. If the .mc file starts with a UTF-8 BOM, it will be read as
      a UTF-8 file. Otherwise, if it starts with a UTF-16LE BOM, it will be read as a UTF-16LE file. If the -u parameter was
      specified, it will be read as a UTF-16LE file. Otherwise, it will be read using the current code page (CP_ACP).


   ○ Now avoids one-definition-rule (ODR) problems in MC-generated C/C++ ETW helpers caused by conflicting configuration
      macros (e.g. when two .cpp files with conflicting definitions of MCGEN_EVENTWRITETRANSFER are linked into the same
      binary, the MC-generated ETW helpers will now respect the definition of MCGEN_EVENTWRITETRANSFER in each .cpp file
      instead of arbitrarily picking one or the other).

Windows Trace Preprocessor (tracewpp.exe)

   ○ Now supports Unicode input (.ini, .tpl, and source code) files. Input files starting with a UTF-8 or UTF-16 byte order mark
      (BOM) will be read as Unicode. Input files that do not start with a BOM will be read using the current code page (CP_ACP).
      For backward-compatibility, if the -UnicodeIgnore command-line parameter is specified, files starting with a UTF-16 BOM
      will be treated as empty.

   ○ Now supports Unicode output (.tmh) files. By default, output files will be encoded using the current code page (CP_ACP).
      Use command-line parameters -cp:UTF-8 or -cp:UTF-16 to generate Unicode output files.

   ○ Behavior change: tracewpp now converts all input text to Unicode, performs processing in Unicode, and converts output text
      to the specified output encoding. Earlier versions of tracewpp avoided Unicode conversions and performed text processing
      assuming a single-byte character set. This may lead to behavior changes in cases where the input files do not conform to
      the current code page. In cases where this is a problem, consider converting the input files to UTF-8 (with BOM) and/or
      using the -cp:UTF-8 command-line parameter to avoid encoding ambiguity.


TraceLoggingProvider.h

   ○ Now avoids one-definition-rule (ODR) problems caused by conflicting configuration macros (e.g. when two .cpp files with
      conflicting definitions of TLG_EVENT_WRITE_TRANSFER are linked into the same binary, the TraceLoggingProvider.h helpers
      will now respect the definition of TLG_EVENT_WRITE_TRANSFER in each .cpp file instead of arbitrarily picking one or the
      other).

   ○ In C++ code, the TraceLoggingWrite macro has been updated to enable better code sharing between similar events using
      variadic templates.

Signing your apps with Device Guard Signing

   ○ We are making it easier for you to sign your app. Device Guard signing is a Device Guard feature that is available in
      Microsoft Store for Business and Education. Signing allows enterprises to guarantee every app comes from a trusted source.
      Our goal is to make signing your MSIX package easier. Documentation on Device Guard Signing can be found here:
      http://docs.microsoft.com/en-us/windows/msix/package/signing-package-device-guard-signing


Breaking changes
Quote

   ○ Removal of api-ms-win-net-isolation-l1-1-0.lib: In this release api-ms-win-net-isolation-l1-1-0.lib has been removed
      from the Windows SDK. Apps that were linking against api-ms-win-net-isolation-l1-1-0.lib can switch to OneCoreUAP.lib as a
      replacement.

   ○ Removal of IRPROPS.LIB: In this release irprops.lib has been removed from the Windows SDK. Apps that were linking
      against irprops.lib can switch to bthprops.lib as a drop-in replacement.


As usual, this build includes several API updates and tweaks. You can view the full release notes from Microsoft for a complete rundown. This build can also be installed beside previous SDK releases in Visual Studio.

source

 12 
 on: November 09, 2019, 04:15:24 PM 
Started by javajolt - Last post by javajolt
T-Mobile is the last of the major cellular service providers in the United States to officially launch a 5G network, with Verizon, AT&T, and Sprint all in on the action already. Today, however, the company announced its plans to launch its 5G network on December 6, and as expected, it'll be based on the 600MHz spectrum that the Un-carrier has been promoting for some time.

Not only that, T-Mobile says this will be nationwide 5G, covering more than 200 million people and 5,000 cities, which is easily ahead of its competitors in terms of scale. To use the company's 5G network, you'll need a Samsung Galaxy Note10+ 5G or a OnePlus 7T Pro 5G McLaren Edition, and if T-Mobile's merger with Sprint is approved, those devices will support Sprint's sub-6GHz 5G network, too.

T-Mobile's outspoken CEO, John Legere, commented on the news, saying:

Quote
"We’re building a 5G network that will allow us to deliver future New T-Mobile moves that are going to be SO massive we couldn’t WAIT to share the first few. We have definitively put a stake in the ground around the kind of company the supercharged Un-carrier will be and the ways we can put this radically better 5G network to work doing GOOD for this country — good for consumers, good for competition and good for innovation! Only the New T-Mobile’s transformative 5G network will FINALLY have the capacity and reach to make the BOLD moves we announced today that are squarely aimed at SOLVING inequities that have huge impacts on our society. When it comes to wireless service, many have been taken advantage of, left behind or completely forgotten. It’s time for another wave of change and the New T-Mobile will be at the forefront of that!"

In addition to the network launch on December 6, T-Mobile made a few promises in case its merger with Sprint is approved. First, the company announced the Connecting Heroes Initiative, which will see the carrier providing free 5G access to every first responder in "public and non-profit state and local police, fire and EMS agency across the entire country". The New T-Mobile promises to maintain this commitment for 10 years.

There's also Project 10Million, which will see a $10 billion investment from New T-Mobile to give free internet to children in households with no internet connection, in an attempt to bridge the "homework gap" - T-Mobile says seven out of 10 teachers assign online homework. In addition, T-Mobile will invest $700 million to provide hardware to 10 million households. Recipients of Project 10Million will get 100GB of free data per year, plus a T-Mobile Wi-Fi hotspot for free, and even those users will be able to benefit from the company's 5G network.

Finally, the New T-Mobile will be offering a T-Mobile Connect plan, which is half the price of the cheapest prepaid plan it currently offers. At just $15 per month, users will get unlimited talk and text, plus 2GB of data, which supports 5G. For $25 per month, data can be bumped up to 5GB. Additionally, T-Mobile says it will add 500MB of data to your plan every year for the next five years, assuming you stay on the plan. It also won't increase the price of the plan for that time. One thing that's worth noting is that data will stop working once the limit is reached, instead of simply throttling the speeds. Additional data can be purchased separately.

Aside from all of that, T-Mobile made some more promises that are undoubtedly attempting to sway regulators to approve the merger with Sprint. The company promises to create more jobs by 2024 than the two separate entities could create combined, expand its Team of Experts to help more customers, and promoting diversity and inclusion initiatives.

The Federal Communications Commission and the Department of Justice have approved of the merger, but there are still some more hurdles in the process. If all goes according to plan, the merger should be finalized in 2020.

source

 13 
 on: November 09, 2019, 04:05:28 PM 
Started by javajolt - Last post by javajolt
It’s safe to say that the announcement of the Surface Pro 7 was one of the biggest reveals at the Microsoft event earlier this month. It’s a hybrid computer that is very much similar to the Surface Pro 6, but it comes with many differences to set itself apart in more ways than one.

Now, one would have expected Microsoft to discontinue the Surface Pro 6, but the company made the wise decision of cutting the cost to own the device, so if you’ve been on the fence for a while now, well, now is your big chance to secure a Surface Pro 6 before its no longer available.

At this moment, however, you might be wondering if the Surface Pro 7 is the right choice for your needs over the previous version. In fact, from what we can tell, there are several reasons for anyone to prefer Surface Pro 7, therefore, we suggest to keep reading in order to learn more.


Surface Pro 7 vs Surface Pro 6

Both of these devices, Surface Pro 7 and Surface Pro 6 are quite good, but only one can come out as the winner today as the best.

1. Display

2. Design

3. Further hardware specs

4. Battery life

5. Price.

Here is the comparison table.


Let's talk about this in more detail.

1] Display

To kick things off, let’s focus on the display for a minute. You see, the display on the Surface Pro 7 is the same found on the Surface Pro 6, and that’s quite disappointing if you ask us. Its a 12.3-inch PixelSense display with a resolution of 2736 x 1824.

There’s also ten-point multi-touch support for anyone who is interested. As it stands, you probably will not be purchasing the new Surface Pro in hopes of getting a new display.

2] Design

In terms of the difference in design, well, there’s not much in it, to be honest. What really sets the Surface Pro 7 apart, is the addition of USB-C. Folks have been calling on Microsoft to add USB-C for quite some time, and happily, the company has obliged.

If that is something that is super important to you, then you may want to stay away from the Surface Pro 6.

3] Further hardware specs

The Surface Pro 7 comes with a 10th-generation Intel Core i3 processor, right up to an i7 variant. The latest Intel UHD graphics are here as well, so that’s nice. As for the Surface Pro 6, it launched with an Intel Core 9th-generation processor, one that is still speedy today.

As for storage, both devices offer 128GB, 256GB, 512GB, or 1TB. However, on the matter of RAM, the Surface Pro 7 begins at 8GB and maxes out at 16. Surface Pro 6 does not have a 16GB option, and we doubt the possibility is there to manually upgrade.


4] Battery Life

As usual with these type of devices, battery life is an important factor, and as such, Microsoft would never compromise in this area, or, that’s what we thought. For some reason, the Surface Pro 7 delivers 10.5 hours of battery life, while the Surface Pro 6 is capable of going up to 13.5 hours.

Not everything is as they seem, so one should bear that in mind before making a decision.

5] Price

Surface Pro 6 is the more affordable of the two because it’s older. The price starts at $699, while the Surface Pro 7 begins at $749. Now, if you’re looking to own a Surface Pro 6 Type Cover bundle, that will set you back around $999, while owning a Surface Pro 7 Type Cover bundle should cost at around $1,058.

There ya have it!

source

 14 
 on: November 09, 2019, 03:54:45 PM 
Started by javajolt - Last post by javajolt
Microsoft has released a new Office Build for Office Insiders on Windows. The new Build 12231.20000 brings improved online video experience in Word — it’ll let you insert new videos and play existing videos in Word. Microsoft also updated the screens that customers see when activating Office that comes bundled with their new PC. You can read the official changelog below.

WHAT’S NEW

Feature updates

 • User Lifecycle

   ■ Experience improvements for AFO activation: Updates to the screens customers see when activating Office that
      comes bundled with their new PC

 • Word

   ■ New and improved online video experience in Word: New and more secure online video experience to help you insert
      new videos and play existing videos in Word

Resolved issues

 • Outlook
   
   ■ Intermittent crash involving cross folder content

 • Office Suite

   ■ Pasting a chart from Excel to PowerPoint can reduce the size of the chart

To update to the latest Office Insider Preview Build, open any Office program and go to File > Account > Update Options > Update Now.

source

 15 
 on: November 09, 2019, 03:36:03 PM 
Started by javajolt - Last post by javajolt


In the last few years, Microsoft has developed a bunch of tools to support enterprises and the company has benefited from those tools while fixing some common problems. Now, Microsoft wants to improve your conference call experience.

According to the patent titled “COMPUTERIZED INTELLIGENT ASSISTANT FOR CONFERENCES”, Microsoft is planning to introduce new conferencing hardware which will identify people using facial and voice recognition. It will then log the meeting accordingly and record everything. The patent was filed last year and was published by the WIPO on 7th November.

Quote
A method for facilitating a remote conference includes receiving a digital video and a computer-readable audio signal. A face recognition machine is operated to recognize a face of a first conference participant in the digital video, and a speech recognition machine is operated to translate the computer-readable audio signal into a first text. An attribution machine attributes the text to the first conference participant. A second computer-readable audio signal is processed similarly, to obtain a second text attributed to a second conference participant. A transcription machine automatically creates a transcript including the first text attributed to the first conference participant and the second text attributed to the second conference participant.
– Microsoft


With a device like this, there’s always a question of privacy. While the patent didn’t talk much about it, we do expect Microsoft to take care of privacy and make sure the details of the meeting don’t fall into the wrong hands.

source

 16 
 on: November 08, 2019, 07:26:01 PM 
Started by javajolt - Last post by javajolt



Microsoft Urges users to patch for BlueKeep RDP vulnerability as it could result in more effective attacks. The Bluekeep exploit can be used to deliver to more notorious malware.

On November 2, 2019, security researcher Kevin Beaumont spotted the RDP attacks that could crash the machine, Marcus Hutchins who analyzed the dumps says that hackers leveraging the Bluekeep vulnerability to install Monero Cryptocurrency miner.

Bluekeep(CVE-2019-0708) is a wormable critical RCE vulnerability in Remote desktop services that let hackers access the vulnerable machine without authentication. As vulnerability is wormable, it could rapidly compromise millions of machines in a short period.

Bluekeep Metasploit Module

Quote
Microsoft researchers connected the previous coin mining attack campaign in September with the October BlueKeep Metasploit campaign. Both the campaigns connected to the same command-and-control infrastructure and they are aimed to install a coin miner.


“This indicated that the same attackers were likely responsible for both coin mining campaigns—they have and they are incorporating the BlueKeep exploit into their arsenal.”

Microsoft worked with the researchers to investigate the crashes and they confirmed BlueKeep exploit module for the Metasploit penetration testing framework used.

Quote
The exploit module used in the attack found to be unstable as it resulted in several crashes. Microsft has built a behavioral detection so that Microsoft Defender ATP customers are protected from the Metasploit module that hit’s Beaumont honeypots.


Microsoft analysis shows that an increase in RDP-related crashes due to the unstable BlueKeep Metasploit module.

Coin Miner Campaigns

The attacks launched as a port scanner’s, if the scanner spotted any vulnerable internet-facing RDP machine, it employs the BlueKeep Metasploit module to run a PowerShell that downloads another encoded Powershell’s from the attackers’ server.



Once these encoded Powershell’s are executed, they download the final coin miner payload and the coin miner payload connected with command-and-control infrastructure at 5[.]100[.]251[.]106.

Beaumont added that “another IP 193[.]104[.]205[.]59 is actively exploiting BlueKeep vulnerability, this one against a honeypot in Singapore.”



The following are the countries that show the presence of coin miner payload used in these attacks, based on Microsoft machine learning models.



Microsoft urges user’s to apply the patch, it may emerge as a serious threat and it can be exploited without leaving traces.



Mitigations

• Block Remote Desktop Services if they are not in use.

• Block TCP port 3389 at the Enterprise Perimeter Firewall.

• Apply the patch to the vulnerable Machines that have RDP Enabled

source

 17 
 on: November 07, 2019, 07:44:33 PM 
Started by javajolt - Last post by javajolt
Annoyed with just how often Windows 10 updates? Join the club! Microsoft has, over the years, transformed the update process of its operating system from something that used to be simple to the complicated creature it is today.

Worse yet, this complication is amplified depending on the variant of the OS you have installed. Windows 10 Home, Windows 10 Pro, the Enterprise or Education versions, what have you, all have different update cadences and policies.

And then there is the type of updates that fly off Microsoft servers, seemingly every day.

The result of all this is that a lot of misconceptions that have taken hold about how the Redmond based company updates its flagship operating system. When in reality, there is some sense and sensibility in how Windows Updates work in Windows 10. And there are, in fact, ways to best go about them.

We will learn all this, and more, in this detailed guide.



You get an update, you get an update, and you get an update!

The aim of this article is to make things clear for you, regarding what kind of updates Microsoft releases, and how they are installed. As an added extra, we have also included a few hints on how you can better control the deployment of updates in the latest and greatest version of Windows.

Speaking of which, you may be wondering why Windows 10 does not give you anywhere near as much control as Windows 7 did? After all, things were working fine back in the glory days of Windows 7.

Microsoft handled it fine back then, so what is the difference?

Thing is, Windows 10 has a need to always require servicing, as long as there are evolving threats and performance improvements. The company changed Windows 10 to a SaaS model, which it conveniently calls Windows as a Service.

Even though Windows 10 is an operating system, it is now described as Software as a Service. It is for this very reason that the OS has to remain connected to the Windows Update service in order to constantly receive patches and updates as they come out of the oven.



This may sound a bit oppressive to customers, particularly those that are rocking Windows 10 Home, as they have limited avenues to delay or defer updates for their system. But even then, the company has made a number of improvements in this regard. Windows 10 has come a long way from its debut back in 2015. Back then the waterways were open. Now, though, the OS provides much finer control over the download, installation, and management of updates — feature and security.

It’s still not perfect, but we’re getting there.

Let’s take a look at the types of updates Windows 10 installs for you.

When is Windows 10 updated?

If your answer is every day, then you are not wrong. Microsoft updates Windows 10 frequently with security patches, bug fixes, performance improvements, and new options. Then there are the main feature updates that get released twice a year. Not to mention, updates for other Microsoft software that may be installed on your system, definition updates for Windows Defender, even updates to the servicing stack and Windows Update components.

All that said, there is definite rhyme and rhythm to how Windows 10 is actually updated. Updates happen automatically in the background, but the OS takes care of what to install and when.

As you’ll see below.

How often does Windows 10 check for updates?

Windows 10 checks for updates once per day, automatically. These checks happen at random times every day, with the OS varying its schedule by a few hours ever time to make sure that Microsoft servers are not jammed with millions of devices checking for updates all at once.



But while Windows checks for updates once every 24 hours or so, it does not mean that it installs them every day. In fact, Microsoft does not even release Windows updates every day. That is why often when you manually check for updates, Windows Update finds no updates available for you and serves up a message that your system is all updated.

However, if the OS finds any updates for your system, it begins downloading them for automatic installation at a suitable time.

Definition updates arrive through the day

Microsoft has built up Windows Defender well over the years, and the security application has come a long way. It is now known as Windows Security and is a complete antimalware platform built natively into Windows 10. As long as you have not installed a third-party antivirus, the service runs automatically in the background to protect your PC.

Due to this, Microsoft needs to roll out regular definition updates for its security solution for it to identify and protect against the latest threats that are discovered in the wild. All security applications do that, and Windows Defender is no different.



But unlike other third-party software, this one gets its updates from Windows Update. Meaning, definition updates arrive multiple times per day. These updates are small, install quickly, and don’t require a reboot. If anything, most of the time, you will not even notice your PC is installing them.

Driver updates are rolled out occasionally

Our next stop is driver updates that Microsoft now serves to Windows 10 users on its own. As you may be aware, hardware drivers are little bits of software that enable your devices and peripherals to function. These are things like your graphics, sound, or WiFi hardware, or printers, scanners, and other such PC components.

Hardware manufacturers release new versions of these drivers every now and then, mostly with bug fixes and performance improvements.

Although you can manually search for deploy these, Windows Update delivers these driver updates for your PC. These are provided by other companies to Microsoft, who then plugs them into Windows Update to be installed on PCs that require them.



How often these are delivered depends upon when hardware manufacturers release them in the first place. GPU manufacturers release their drive updates most regularly. But you will see them every now and then when you check your update history. And turning them off is also possible.

Worth a mention that you may have to restart your PC for certain driver updates.



Cumulative updates are sent once a month

Also known as quality updates, these updates are cumulative in nature and arrive on the second Tuesday of each month. Microsoft calls this event Patch Tuesday, though there is also a recent phenomenon known as Super Patch Tuesday.

Regardless of what these are known as these are big updates that are made up of security fixes as well as other bug fixes that are accumulated over the course of a month. They’re called cumulative updates for this reason — they bundle a large number of fixes, even fixes from previous updates.

The big idea is to ensure that when refreshing your PC with the latest cumulative update, you get all the previous one packed in as one big cumulative update. This comes in handy if your PC has not been updated for a while.

But while these updates sound simple in nature, the devil is in the technical details.

Patch Tuesday’s main cumulative update is known as a “B update” because it’s released in the second week of the month. But Microsoft also likes to send over “C” and “D” updates as well, which are released in the third and fourth weeks of the month. You will only get these additional ones if you manually click the “Check for Updates” button in Windows Update. If not, then they will arrive as part of the next Patch Tuesday cycle.

Since cumulative updates handle important files in the operating system, they require a reboot. These files really cannot be modified while Windows is running.

Out-of-band updates fly off in emergencies

In a perfect world, Microsoft would only roll out updates once a month on Patch Tuesday. And believe you me, the software titan does try to do that. But occasionally, the company is forced to release what are called “out-of-band” updates, outside of the normal schedule.

As you can imagine, these are generally released in emergencies, mostly when there is a 0-day security flaw that is being exploited in the wild and the vulnerability must be fixed immediately.

Out-of-band updates generally require a reboot.

Feature updates knock on your door every six months

And now we get to the stars of the show! Feature updates. Microsoft releases these big, major versions of Windows 10 once every six months, spring and autumn. These key updates for the OS include a lot of changes, improvements and new features — hence their name.

This is when you get features like the light theme, Windows Sandbox, new default apps, updates to the native applications, and notable changes to the operating system itself. Microsoft likes to codename them like 19H1 and 19H2, but their actual rollout designation is different, as the April 2019 Update.

That said, these do not always roll out immediately.

Microsoft has systems in place to ensure a gradual and throttled rollout of these. The company will only offer you a feature update if it thinks it will run well on your hardware. Of course, you can always go looking for them, and deploy them yourself, or move in with a fresh clean install using an ISO image.

Goes without saying, these big updates always require a reboot, and come with a much longer installation process that has you staring at a blue screen while the process finishes. If you see a “Working on Updates” screen or notice that “Your PC will restart several times”, Windows is probably installing a feature update.



The time required to install a feature update depends upon how fast your PC is. But don’t be surprised if it takes you an hour or more to reach the finish line. Redmond is trying to speed up the installation process, though, and has made notable progress over the last few versions.

Control when Windows updates are installed?

This truly is the pressing matter of our time. Windows 10 likes to take things in its own virtual hands and does not give you too much of a say in when and how the updates are download and installed. Even as things have constantly been improving in this regard.

We list a few different ways to gain some more control over how Windows 10 is updated.



For starters, you can prevent Windows from automatically installing updates and rebooting at the most inopportune times using the Active Hours feature. Windows will not deploy updates and patches during this time frame, which can be set for up to 18 hours each day.



Another way to prevent the installation of updates is by setting your primary connection as metered. Doing this, Windows will only download a few critical, necessary and small patches, and most other updates will not be beamed and deployed automatically. Although this setting is designed to save data on cellular connections and connections with limited data, it can be enabled on any connection, even a wired one.



And finally, Microsoft continues to refine the ability to pause, defer and delay the deployment of updates in Windows 10. Windows 10 Professional users already had these abilities, but Windows 10 Home users now also have access to these handy options.

Conclusion

Few things are more frustrating on a PC than an update that either takes its sweet time to be deployed or one that wrecks up the system after it is installed. Granted, the majority of users go through these updates without any issues. But the consequences can be rather severe for the unfortunate few.

Reality is, this is how Windows 10 handles servicing. The problems are patched almost immediately, but that process itself often leads to more issues that need further fixes.

Unless Microsoft how Windows is updated inside out, this is the reality that remains!

source

 18 
 on: November 07, 2019, 12:59:33 PM 
Started by riso - Last post by riso
Beijing has announced plans to develop 6G technology in the hope of cementing its supremacy in wireless connection amid a US-led crusade against Chinese companies over 5G networks. China’s Science and Technology Ministry has set up two teams to develop a 6G network. The first group links several government agencies, while the second one unites more than 30 experts from various universities, research centers and corporations.
Speaking at a “kick-off” meeting over the weekend, Vice Minister Wang Xi noted that current global knowledge in the relevant field remains at an “exploratory stage” and the exact path to 6G is “still not clear.” However, Beijing is determined to win the race to dominate in wireless technology and will present a detailed plan for 6G development sometime in the future.
Chinese companies have been in intense competition with their US and South Korean rivals to roll out 5G networks, which would allow for faster internet speed and more advanced smartphones. Last week, three state-backed operators began offering ‘superfast’ 5G services to Chinese consumers.
The CEO of Huawei, one of the leaders in 5G revolution, Ren Zhengfei, confirmed in September that the company started to work on 6G “a long time ago,” but the technology is still “10 years out.”
The US government, meanwhile, has been accusing Beijing of using companies like Huawei for espionage, and pressured its allies in Europe to ban Chinese companies from their national 5G networks. Beijing vehemently denies these allegations. Some European states, including Germany, were also not too keen on following Washington’s stance and refused to bar Huawei from entering their 5G market.
Source and pic via rt.com | FILE PHOTO A journalist uses her mobile phone to broadcast live in Beijing on April 25, 2019. © AFP / Wang Zhao

 19 
 on: November 06, 2019, 02:16:50 PM 
Started by javajolt - Last post by javajolt
Malwarebytes has released version 4.0 of their flagship antivirus product and with it comes a new scanning engine, a new user interface, threat statistics and more.

At this time, Malwarebytes 3.x is not automatically upgrading to Malwarebytes 4.0. If you wish to upgrade to this new version you will need to download the installer directly from Malwarebytes site.

Below we will take a look at what has changed in this new version.

A look at the new interface

The biggest change users will experience is the new user interface. With Malwarebytes 4.0, the main sections consisting of the quarantine, scanner, and real-time protection settings are clearly shown on the dashboard.



Clicking on a section will cause a flyout overlay to appear where you can change settings, view the quarantine, or perform a scan

Of all the sections, the Real-Time Protection screen has changed the most. In these sections, users can now easily manage the different protections but also see stats on the malicious sites, ransomware, exploits, or malware and PUPs that Malwarebytes 4.0 has prevented.

In addition, this section will also display the latest posts from the Malwarebyte's blog.


Malwarebytes Protection Settings

Other than that, the rest of the sections contain the same functionality as the previous version.


Scanner section

Under the hood

Malwarebytes 4.0 comes with a new scanning engine called "Katana" that includes the following features:

   • Improved zero-hour detection – pinpoints new threats as they arise and before they
     can wreak havoc on your device

   • Expanded malware detection – blocks even more malware for improved protection

   • Signature-less behavioral detection – identifies the latest variants of dangerous
     malware families that attempt to evade traditional signatures through runtime packing,
     obfuscation, and encryption, offering instant protection against new threats that traditional
     AV has a hard time detecting

With this release, Malwarebytes considers itself an antivirus replacement and will now register itself with the Windows Security settings as the primary antivirus solution on the computer. This makes it easy to manage from Windows and will allow Windows 10 to alert if you if the real-time protection feature is disabled.



Unfortunately, for users running Windows XP or Windows Vista, Malwarebytes 4.0 will no longer work on those operating systems. If you are running Windows XP or Vista, you can continue using Malwarebytes 3.x, which will be supported for the foreseeable future.

In full disclosure, BleepingComputer is an affiliate of Malwarebytes.

source

 20 
 on: November 06, 2019, 01:44:11 PM 
Started by javajolt - Last post by javajolt
Security firm Trend Micro has revealed details of an inside scam which led to personal details of its customers being exposed.

The security incident dates back to August this year, and the company says that it was made aware of customers being contacted by fake Trend Micro support staff. Following an investigation lasting until the end of October, it was determined that it was a member of staff that had fraudulently gained access to a customer database and sold personal data to a third party.

Trend Micro says that the employee was able to access names, email addresses, support ticket numbers, and telephone numbers, stressing that it was an inside job and not an external hack. The finger of blame points squarely at "a Trend Micro employee who improperly accessed the data with a clear criminal intent", and law enforcement is now involved.

In an announcement about the incident, Trend Micro explains:

Quote
In early August 2019, Trend Micro became aware that some of our consumer customers running our home security solution had been receiving scam calls by criminals impersonating Trend Micro support personnel.  The information that the criminals reportedly possessed in these scam calls led us to suspect a coordinated attack.

Although we immediately launched a thorough investigation, it was not until the end of October 2019 that we were able to definitively conclude that it was an insider threat. A Trend Micro employee used fraudulent means to gain access to a customer support database that contained names, email addresses, Trend Micro support ticket numbers, and in some instances telephone numbers. There are no indications that any other information such as financial or credit payment information was involved, or that any data from our business or government customers were improperly accessed.

Our investigation revealed that this employee sold the stolen information to a currently unknown third-party malicious actor. We took swift action to contain the situation, including immediately disabling the unauthorized account access and terminating the employee in question, and we are continuing to work with law enforcement on an ongoing investigation.

While the company says that the incident affects less than 1 percent of its 12 million consumer customers, this still means that the details of over 100,000 people could have been exposed.

source

Pages: 1 [2] 3 4 ... 10
Powered by SMF 1.1.21 | SMF © 2017, Simple Machines

Google visited last this page Today at 01:18:03 AM