Recent Posts

Pages: 1 2 3 [4] 5 6 ... 10
31
Windows 10 News / Not dead yet: Windows 10 gets a handy new sharing feature
« Last post by javajolt on March 16, 2024, 09:36:36 PM »
Microsoft may not plan on releasing any huge new feature updates for Windows 10, but that doesn’t mean it won’t necessarily receive new features from time to time. Among other things, Microsoft released the “2024-03 Cumulative Update for Windows 10 Version 22H2 for x86-based Systems (KB5035845)” for Windows 10 during March’s Patch Tuesday. This update adds a new feature to the veteran Windows 10: You can now share files (text documents, PDFs, images, videos, etc.) from the File Explorer of Windows 10 directly via Whatsapp and other services, as Windowslatest reports. Sharing takes place via the Nearby Share feature, over Bluetooth or Wi-Fi.

Simply right-click on the desired file and then select “Share” and then “Whatsapp” from the list that Windows 10 then displays. Then select the contact to whom the file should be sent via Whatsapp.

Sharing via Gmail, Facebook, and LinkedIn is also possible in Windows 10. Windows 10 does not yet support X aka Twitter. However, Microsoft is set to bring sharing via X/Twitter with one of the next updates, according to media reports.

In addition to files, you should be able to share links via WhatsApp, Gmail, Facebook,

 and Linkedin.

How to get Windows 10 Update KB5035845

KB5035845 installs Windows Update automatically on your computer. Alternatively, you can download KB5035845 here from the Microsoft Update Catalog. Make sure that you download the correct version for your system. The download is between 436 MB and 831 MB in size, depending on the processor type.

After installing the update, your operating system will have the following build number: Windows 10 Build 19045.4170.

source
32
Windows 12 / Windows 12 'first look' will make you want the future OS right now
« Last post by javajolt on March 16, 2024, 01:45:08 PM »


Microsoft is preparing to discontinue support for Windows 10 in the near future, giving users the option to either upgrade to Windows 11 or wait for the anticipated successor, Windows 12.

We’re not expecting to see the arrival of the next-gen operating system this year -- Microsoft is focused on adding more AI fuA couple of concept creators have put their talents to good work imagining what the follow up to Windows 11 could look like. AR 4789 -- who previously imagined a wildly popular alternative to Windows called MiracleOS -- showed us what Windows 12 might look like being installed, and the features we can expect to see. He also recently gave us his intriguing take on Windows 12 Mobile.

Fellow concept creator Addy Visuals recently put his creative abilities into imagining what Windows 12 Gaming Edition could look like, and before that, he gave us his take on a non-gaming version of Windows 12 -- the end result of which was stunning.

For his latest video, Addy returns to his main Windows 12 concept, and gives us a short 'first look' recap.nctionality to Windows 11 at the moment -- but we do have an idea of what Windows 12 could look like.



This new video is just a 30-second summary of his earlier creation, but even if you’ve seen his original full concept, this new clip is still worth a watch.

Let us know what you think of it in the comments below.



source
33

Image: HP via Best Buy

What if you could make your old PC twice as fast without having to upgrade any of the hardware? That’s the idea behind new research into a system called simultaneous and heterogeneous multithreading, or SHMT. According to a presentation shared by researchers, this PC breakthrough could revolutionize our modern PC speeds without hardware upgrades.

It’s an interesting idea and one that could see a lot of potential uses throughout multiple industries. The team behind the new research includes researchers from the University of California, Riverside (UCR), and they say it has a lot of potential not just in boosting the performance of hardware but also in boosting efficiency and reducing the amount of energy they use.

The new PC breakthrough essentially takes advantage of the fact that modern computers, phones, and other electronics have more than one processor to handle most of their “thinking.” This is handy because it allows for multiple parts of the system to handle different things, including the CPU, GPU, and even the TPU. However, it also means that there can be bottlenecks between the data shifting between these different processors.


SHMT could provide significant performance upgrades to PCs without requiring any hardware changes.
Image source: ASUS/Amazon


That’s where SHMT comes into play. This allows for the tasks to run simultaneously across multiple processors. This speeds up the efficiency of the tasks overall, and because the workload is spread out, it doesn’t take as much energy to run those tasks, either. The researchers say they saw improvements in processing up to 1.95 times faster and that energy usage was reduced by nearly 51 percent in their tests.

But, there are some significant challenges to bringing this PC breakthrough to every device on the market right now. For starters, it needs to pass through touch quality assurance tests to ensure that there isn’t any kind of potential precision mismatch in the architectures found within the processors.

So, if we do see SHMT coming to devices anytime soon, it’ll probably be very limited, as quality will need to be assured to ensure it’s providing the performance and efficiency increases that it is supposed to. A paper on the breakthrough is available online, and it was presented at the 56th annual IEEE/ACM International Symposium on Microarchitecture in Toronto, Canada.

source
34


A new variant of StopCrypt ransomware (aka STOP) was spotted in the wild, employing a multi-stage execution process that involves shellcodes to evade security tools.

StopCrypt, also known as STOP Djvu, is the most widely distributed ransomware in existence that you rarely hear about.

While you constantly hear how big some ransomware operations are, such as LockBit, BlackCat, and Clop, you rarely hear security researchers discussing STOP.

That is because this ransomware operation does not typically target businesses but rather consumers, hoping to generate tens of thousands small $400 to $1,000 ransom payments instead of one large multi-million-dollar demand.

The ransomware is commonly distributed via malvertising and shady sites distributing adware bundles disguised as free software, game cheats and software cracks.

However, when these programs are installed, the users become infected with a variety of malware, including password stealing trojans and STOP ransomware.

This leads infected users to desperately reach out to security researchers, ransomware experts, and our 807-page STOP ransomware forum topic to try and receive help.

Since its original release in 2018, the ransomware encryptor has not changed much, with new versions mostly released to fix critical problems.

For this reason, when a new STOP version is released, it bears watching due to the large number of people who will be affected by it.

New multi-staged execution

SonicWall's threat research team has uncovered a new variant of the STOP ransomware (they call it StopCrypt) in the wild that now utilizes a multi-stage execution mechanism.

Initially, the malware loads a seemingly unrelated DLL file (msim32.dll), possibly as a diversion. It also implements a series of long time-delaying loops that may help bypass time-related security measures.

Next, it uses dynamically constructed API calls on the stack to allocate the necessary memory space for read/write and execution permissions, making detection harder.

StopCrypt uses API calls for various operations, including taking snapshots of running processes to understand the environment in which it's operating.

The next stage involves process hollowing, where StopCrypt hijacks legitimate processes and injects its payload for discreet execution in memory. This is done through a series of carefully orchestrated API calls that manipulate process memory and control flow.

Once the final payload is executed, a series of actions takes place to secure persistence for the ransomware, modify access control lists (ACLs) to deny users permission to delete important malware files and directories, and a scheduled task is created to execute the payload every five minutes.


StopCrypt's scheduled task (SonicWall)

Files are encrypted and a ".msjd" extension is appended to their new names. However, it should be noted that there are hundreds of extensions related to the STOP ransomware as they change them often.

Finally, a ransom note named "_readme.txt" is created in every impacted folder, giving victims instructions on paying the ransom for data retrieval.


Sample of a ransom note (Sonic Wall)

The evolution of StopCrypt into a more stealthy and powerful threat underscores a troubling trend in cybercrime.

Though StopCrypt's monetary demands aren't high and its operators do not perform data theft, the damage it can cause to many people could be significant.

source
35
Android O.S | Apps / PixPirate Android malware uses new tactic to hide on phones
« Last post by javajolt on March 15, 2024, 03:14:25 PM »


The latest version of the PixPirate banking trojan for Android employs a new method to hide on phones while remaining active, even if its dropper app has been removed.

PixPirate is a new Android malware first documented by the Cleafy TIR team last month seen targeting Latin American banks.

Though Cleafy noted that a separate downloader app launches the malware, the report didn't delve into its innovative hiding or persistence mechanisms, or these were introduced only recently.


Icons used by dropper apps (Cleafy)

A new report by IBM explains that contrary to the standard tactic of malware attempting to hide its icon, which is possible on Android versions up to 9, PixPirate does not use a launcher icon. This enables the malware to remain hidden on all recent Android releases up to version 14.

However, not using an icon at all creates the practical problem of not giving the victim a way to launch the malware.

IBM Trusteer researchers explain that the new PixPirate versions utilize two different apps that work together to steal information from devices.

The first app is known as a 'downloader' and is distributed through APKs (Android Package Files) that are spread via phishing messages sent on WhatsApp or SMS.

This downloader app requests access to risky permissions upon installation, including Accessibility Services, and then proceeds to download and install the second app (named 'droppee'), which is the encrypted PixPirate banking malware.

The 'droppee' app does not declare a main activity with "android.intent.action.MAIN" and "android.intent.category.LAUNCHER" in its manifest, so no icon appears on the home screen, making it completely invisible.

Instead, the droppee app exports a service that other apps can connect to, which the downloader connects to when it wants to trigger the launch of the PixPirate malware.

Apart from the dropper app that can launch and control the malware, these triggers could be device boot, connectivity changes, or other system events that PixPirate listens for, allowing it to execute in the background.


Service declaration (top) and event binding (bottom) (IBM)

"The droppee has a service called "com.companian.date.sepherd" exported and holds an intent-filter with the custom action 'com.ticket.stage.Service.'," explains IBM's analysts.

"When the downloader wants to run the droppee, it creates and binds to this droppee service using the API "BindService" with the flag "BIND_AUTO_CREATE" that creates and runs the droppee service."

"After the creation and binding of the droppee service, the droppee APK is launched and starts to operate."

Even if the victim removes the downloader app from the device, PixPirate can continue to launch based on different device events and hide its existence from the user.

Hidden money transfers

The malware targets the Brazilian instant payment platform Pix, attempting to divert funds to attackers by intercepting or initiating fraudulent transactions.

IBM says Pix is very popular in Brazil, where over 140 million people use it to conduct transactions that have exceeded $250 billion as of March 2023.

PixPirate's RAT capabilities allow it to automate the entire fraud process, from capturing user credentials and two-factor authentication codes to executing unauthorized Pix money transfers, all in the background without users' knowledge. However, Accessibility Service permissions are required for this.

There's also a fallback manual control mechanism for when the automated methods fail, giving the attackers another channel to perform on-device fraud.

Cleafy's report from last month also highlighted the use of push notification malvertising and the malware's capability to disable Google Play Protect, one of Android's core security features.

Though PixPirate's infection method isn't novel and can be easily remediated by avoiding APK downloads, not using an icon and registering services bound to system events is an alarming new strategy.

BleepingComputer has contacted Google for a comment on whether it plans to introduce any measures that block this tactic, and a spokesperson has sent us the following statement:

Quote
Based on our current detections, no apps containing this malware are found on Google Play.

Android users are automatically protected against known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services.

Google Play Protect can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play. - A Google spokesperson

source
36


Google I/O 2024 now has an official date for when it will reveal what's next in AI, Android, and Pixel. Google's annual developer event is right around the corner.

Here is what we're likely to see.

Google has had a pretty eventful year already, rebranding its AI chatbot from Bard to Gemini and releasing several new AI models. At Google I/O, we expect the company to make even more announcements regarding AI, and unveil new hardware for 2024.

Google sent out event invites to the press -- including ZDNET -- that reveal the annual developer conference is taking place on May 14 and 15 at the Shoreline Amphitheatre in Mountain View, California. Developers can register for the event on the Google I/O landing page for free to take advantage of perks such as getting email updates and accessing on-demand sessions.

The main keynote, which is when Google leaders take the stage to unveil the company's latest hardware and software, is going to take place on the first day of the conference at 10 AM PT / 1 PM ET.

Although the invite doesn't specify details about tuning in remotely, you can expect Google to livestream the event on YouTube and its website, as the company usually does for members of the public and press who can't attend in person.

Google's event description on both its invite and its website is vague. The invite reads, "Learn about Google's newest developer tools and discover how they fuel innovation and enhance your workflow for maximum productivity."

However, given the announcements already made this year, we expect the focal point of the event to be artificial intelligence. At last year's I/O, AI was also the crown jewel of the event with major announcements such as two new large language models (PaLM 2 and Bard-now-Gemini), new AI features in Android 14, chatbot improvements, and more.

Similarly, this year, you can expect to learn more about the new features in Android 15, which will likely feature a myriad of new AI capabilities, updates to Gemini, and maybe even a new large language model.

The event will presumably showcase some new hardware too. If Google I/O 2024 follows past installments, Google will unveil a new smartphone, the Pixel 8A. The Pixel 7A, revealed at least year's event, proved to be an impressive A-series device and mid-range smartphone when reviewed by ZDNET.

Google I/O is notorious for surprises, meaning you can also expect something no one is talking about. ZDNET will be covering the event, so if you can't tune in, you can check the site for the latest updates.

source
37


You’re shopping for a gift, or doing something personal, and oops! Someone waltzes into the room. No problem – just hit Command + M on a Mac or Windows + M on a Windows PC to instantly minimize the program you have open.

There are so many little tips and tricks that make using your tech better. I’ve got a ton up my sleeve that are privacy-focused. If you find one new to you, share this article with a friend!

Apple keeps track of where you go and how often you visit. It can then make suggestions based on what it calls Significant Locations. You might see these as calendar events or map directions alerts.

Sure, it’s helpful, but not everyone likes it. You can clear this list.

◾ On your iPhone, go to Settings > Privacy & Security > Location Services > System Services.

◾ Tap Significant Locations.

◾ Hit the Clear History button.

You’re sending more than a selfie

Most people don't realize all they share when sending a picture via text. Nearly every social media site strips out the metadata that reveals a photo's little details, like when, where and how it was taken. But that info is not protected if you text a pic. You can stop that.

To stop location sharing on iPhone:

◾ Open the image you want to send and tap the share button.

◾ Select Options and toggle off Location. Tap Done.

To disable location tracking in your camera altogether:

◾ Open Settings. Tap Privacy & Security > Location Services.

◾ Scroll down, tap on Camera, then select Never.

On Android, here’s how to wipe the location data for a single photo:

◾ Open your gallery and select the photo.

◾ Go to Details (it may be a three-dot menu) and click Remove location data.

Disable Bluetooth when you don’t need it

Bluetooth works similarly to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data. And like any other connection, it’s not 100% safe.

Hackers and scammers must be close to you to use Bluetooth to hijack your phone. But in just about any public space, you’re arm’s length from strangers.

My advice: Turn off Bluetooth when you’re not using it. Keeping it active all the time makes your device more discoverable. As a bonus, keeping Bluetooth off will increase your device’s battery life.

◾ On an iPhone, go to Settings > Bluetooth and switch it off. You can also swipe down from the top right of your screen to open the Control Center and tap the Bluetooth icon.

◾ The same steps work for Android phones. Go to Settings > Connected Devices> Connection Preferences > Bluetooth and switch it off. (Note: Steps vary based on your phone’s model. Look or search for Bluetooth if these steps don’t match your phone.)

Airplane mode also disables Bluetooth and Wi-Fi, among other things, so it works in a pinch – but you won’t receive calls or texts.

Swap your pen for a safer one

It’s kind of crazy to me that check fraud is increasing in a big way. Criminals go to mailboxes and target envelopes that look like checks being mailed or bill payments.

Check washing is the most common type of check fraud. This is where a crook steals a check from the mail and alters the payee’s name so they can cash it. They often change the amount of money as well.

If you need to write a check, use a security pen, also known as a check-washing pen. Uni-ball 207 Series pens (4 for around $10 on Amazon) use specially formulated ink that gets trapped into the paper, making it difficult for criminals to wash or erase the ink on a check.

To be extra safe, skip the mailbox and take your checks directly to your local post office.

Don’t forget crooks like to go offline too

Thieves still use old-school tactics they think we all forgot about. We’re too smart for that, right?

◾ Out in public, keep your purse and wallet close. Only bring the cards you'll be using.

◾ Be aware of who’s around when you pull out your phone, and hide your screen as you type in your PIN.

◾ Leave your Social Security card, birth certificate and passport at home unless you truly need them.

◾ Shred old bills and financial records before tossing them.

◾ Review your credit report and bank statements regularly.

Here’s how to get a free report.

If you get scammed, resist the urge to stay quiet. Report fraud, scams and bad business practices to the FTC. If you gave out your Social Security number, contact the SSA immediately.

source
38
eBooks all to know / Get 'Python for Data Science for Dummies, 3rd Edition'
« Last post by javajolt on March 14, 2024, 12:15:49 PM »
Let Python do the heavy lifting for you as you analyze large datasets.

Python for Data Science for Dummies lets you get your hands dirty with data using one of the top programming languages. This beginner’s guide takes you step by step through getting started, performing data analysis, understanding datasets and example code, working with Google Colab, sampling data, and beyond.

Coding your data analysis tasks will make your life easier, make you more in demand as an employee, and open the door to valuable knowledge and insights.

This new edition is updated for the latest version of Python and includes current, relevant data examples.

   • Get a firm background in the basics of Python coding for data analysis

   • Learn about data science careers you can pursue with Python coding skills

   • Integrate data analysis with multimedia and graphics

   • Manage and organize data with cloud-based relational databases

Python careers are on the rise. Grab this user-friendly Dummies guide and gain the programming skills you need to become a data pro.

Python for Data Science for Dummies, from Wiley, usually retails for $21 but BetaNews readers can get it entirely free for a limited time.

Follow this link to get your copy of "Python for Data Science for Dummies" for this free guide. This link will redirect you to my One Drive account and click Download. [system administrator]

source
39


Technically we are still in winter for another few days, but it's already time to look ahead to early June. In the past, video game fans looked forward to getting a ton of news in early June from publishers and developers as they revealed them as part of the E3 trade show. Unfortunately, E3 was officially shut down late in 2023, despite efforts to bring it back to Los Angeles.

Now an event that started up a few years ago, Summer Game Fest, is shaping up to be a (kind of) E3 replacement. It started as a streaming-only event but has since expanded to also include a live event and has provided full announcements, release dates, and surprises for game fans

Today, it was officially announced that Summer Game Fest 2024 will be streaming to the world on Friday, June 7, starting at 2 pm Pacific time (5 pm Eastern time. It will last about two hours.


click image to sign up

People will be able to attend the event in person at the YouTube Theater in Los Angeles on that day as well. Attendees at last year's event got a chance to see Nicholas Cage make a surprise appearance as he promoted being included in a special Dead by Daylight in-game event.

Microsoft has also confirmed it will hold an Xbox Game Showcase event in early June as well, and it will likely be held a day or two after Summer Game Fest. We also expect to see other publisher game showcases around the same time frame as well (fingers crossed for Devolver Digital).

IGN announced plans to hold an event in downtown LA, called IGN Live, about a month ago, sometime in early June, as a possible E3 replacement. However, IGN has yet to offer any concrete details on this new event since that initial reveal.

source
40
General Discussion / Is a Dash Cam for Your Car’s Front and Rear Worth It
« Last post by javajolt on March 14, 2024, 09:47:23 AM »
This is very off-topic, however, it could be relevant to anyone thinking about a Dash Cam.



Having a dash cam mounted on the front and rear of your car is a lot like having an extra set of eyes for your vehicle. It captures events and details when you aren’t looking, and while that’s certainly convenient, some people don’t really think they’re worth the money.

What Is a Dash Cam?

A dashboard camera, or simply a dash cam, refers to a travel-sized camera that typically records the front and rear of a vehicle. It’s typically mounted on the dashboard, but you can also find it installed on the windshield, the back of the rearview mirror, or the rear window of a car.

How Do Dash Cams Work?

Most dash cams come with a secure digital (SD) memory card, where the dash cam stores all of its recordings. Depending on the model, the dash cam will typically overwrite and record over existing videos once the SD card is full.

You can find all types of aftermarket dash cams, such as battery-powered ones and those with power ports. Some vehicles also have built-in dash cams, which are hardwired into the car’s power supply.

Pros of Owning a Dash Cam

Still unsure about buying your dash cam? Here are some of the advantages of owning one to consider:

Video Evidence

With a dash cam, you can record any incidents that might happen to your vehicle. A front and rear dash cam can catch the license plates of hit-and-run drivers, making it easier for the cops to track them down.

Protection Against Fraud

Claiming with your insurance company can be hard, but it can be a lot easier with the help of a dash cam. Footage from your front and rear dash camera serves as evidence that can help you speed up the claims process, while also protecting you against fraudulent claims from other drivers.

Added Security

Did you know some dash cams have a parking mode feature? It’s a convenient feature that activates your camera when it senses movement around your vehicle, helping you park without hitting anything.

Parental Monitoring

Some dashcams have global positioning system (GPS) tracking and other safety features that are great for inexperienced teenage drivers. Plus, installing a dash cam in your child’s vehicle can help you monitor their driving.

Cons of Owning a Dash Cam

To figure out whether a dash cam is worth it or not, you’ll have to think about the disadvantages too. Consider some of the cons of owning a dash cam:

Video Evidence Against You

While dash cams provide you with evidence against other people, they also provide others with evidence against you. Dash cams record everything until you turn them off, so they can capture accidents where you’re the one at fault.

Invasion of Privacy

Whether you own a front or rear dash cam, dash cams typically record in public spaces, which means there’s a big chance you might intrude on someone’s privacy.

Cost

Owning an aftermarket dash cam obviously costs money, and while you can certainly find dash cams within your price range, you’ll have to shell out around $200 if you want one with more features.

You can still find decent dash cams for less than $100, but you can expect the high-end ones to cost over $700.

Inadequate Storage Capacity

Dash cams that come with SD cards typically have inadequate storage capacity, which means you’ll either have to make a backup of your footage frequently or accept the fact that old footage will be lost to new videos at some point.

Attracts Thieves

You’d think a dash cam would scare off thieves, but apparently, some people just don’t know when to stay away. A dash cam mounted in plain sight can be tempting, especially if it’s an expensive one.

Features To Consider When Buying a Dash Cam

Now that you’re convinced that you should own a dash cam, it’s time to go over what you should look for when buying one. Here are some features to consider when choosing from your dash cam prospects:

Resolution

Try buying a dash cam with at least 1280 x 720 pixels. Any lower than that and you might have a hard time seeing the smaller details in your footage.

Angle of View

You don’t need an angle of view that’s too wide. A 150-degree field of view is likely the best choice, and going above that might cause your video to look weird and distorted.

Frame Rates

The number of image frames per second (fps) is important when it comes to videos. If you want smooth footage, 30 fps is a good enough baseline. Going below that can result in choppy quality.

Channels

Some dash cams offer multiple channels, which means you can have a better view of the things around your vehicle. For example, channel one displays your view from the windshield, while channel two switches to your cabin.

SD Card Compatibility

Dash cams aren’t compatible with all types of SD cards, so you’ll have to make sure you get one that matches your preference. If you want to use a 256-gigabyte (GB) SD card, then be careful not to get a dash cam that only works with a 128 GB SD card.

GPS

A dash cam with a GPS feature will make it easier to track the specific locations in your videos, which can come in handy if you travel a lot.

Wi-Fi and Bluetooth

Some dash cams can store their videos in a cloud through the Wi-Fi, while some can also connect to your smart devices using Bluetooth. Buying a dash cam with both connection features can make accessing your footage a lot easier.

Other Added Features

High-end dash cams come with added features that aren’t necessary but certainly aren’t unwelcome. Sound recording, image stabilization, night vision, and a parking monitor system are great features to consider if you have the money to spare.

How To View Recorded Dash Cam Videos

Depending on the model of your car’s front and rear dash camera, there are different ways you can view your recorded footage. Here are some examples:

   • Watch on your camera display

   • Connect your smartphone to your dash cam using Bluetooth

   • Remove the SD Card and insert it into your computer’s card reader

   • Retrieve uploaded videos on your dash cam’s cloud

Be sure to choose whichever method is compatible with your dash cam. If you aren’t entirely sure which method to use, you can always consult your dash cam’s manual.

source
Pages: 1 2 3 [4] 5 6 ... 10