Recent Posts

Pages: [1] 2 3 ... 10
1
Microsoft / The US Government Has a Microsoft Problem
« Last post by javajolt on April 17, 2024, 05:23:25 PM »
Microsoft has stumbled through a series of major cybersecurity failures over the past few years. Experts say the US government’s reliance on its systems means the company continues to get a free pass.


Photograph: Joan Cros/Getty Images
When Microsoft revealed in January that foreign government hackers had once again breached its systems, the news prompted another round of recriminations about the security posture of the world’s largest tech company.

Despite the angst among policymakers, security experts, and competitors, Microsoft faced no consequences for its latest embarrassing failure. The United States government kept buying and using Microsoft products, and senior officials refused to publicly rebuke the tech giant. It was another reminder of how insulated Microsoft has become from virtually any government accountability, even as the Biden administration vows to make powerful tech firms take more responsibility for America’s cyberdefense.

That state of affairs is unlikely to change even in the wake of a new report by the Cyber Safety Review Board (CSRB), a group of government and industry experts, which lambasts Microsoft for failing to prevent one of the worst hacking incidents in the company’s recent history. The report says Microsoft’s “security culture was inadequate and requires an overhaul.”

Microsoft’s almost untouchable position is the result of several intermingling factors. It is by far the US government’s most important technology supplier, powering computers, document drafting, and email conversations everywhere from the Pentagon to the State Department to the FBI. It is a critical partner in the government’s cyberdefense initiatives, with almost unparalleled insights about hackers’ activities and sweeping capabilities to disrupt their operations. And its executives and lobbyists have relentlessly marketed the company as a leading force for a digitally safer world.

These enviable advantages help explain why senior government officials have refused to criticize Microsoft even as Russian and Chinese government-linked hackers have repeatedly breached the company’s computer systems, according to cybersecurity experts, lawmakers, former government officials, and employees of Microsoft’s competitors.

These people—some of whom requested anonymity to candidly discuss the US government and their industry’s undisputed behemoth—argue that the government’s relationship with Microsoft is crippling Washington’s ability to fend off major cyberattacks that jeopardize sensitive data and threaten vital services. To hear them tell it, Microsoft is overdue for oversight.

A History of Breaches and Controversy

Microsoft has a long track record of security breaches, but the past few years have been particularly bad for the company.

In 2021, Chinese government hackers discovered and used flaws in Microsoft’s email servers to hack the company’s customers, later releasing the flaws publicly to spark a feeding frenzy of attacks. In 2023, China broke into the email accounts of 22 federal agencies, spying on senior State Department officials and Commerce Secretary Gina Raimondo ahead of multiple US delegation trips to Beijing. Three months ago, Microsoft revealed that Russian government hackers had used a simple trick to access the emails of some Microsoft senior executives, cyber experts, and lawyers. Last month, the company said that attack also compromised some of its source code and “secrets” shared between employees and customers. On Thursday, the Cybersecurity and Infrastructure Security Agency (CISA) confirmed that those customers included federal agencies, and issued an emergency directive warning agencies whose emails were exposed to look for signs that the Russian hackers were attempting to use login credentials contained in those emails.

These incidents occurred as security experts were increasingly criticizing Microsoft for failing to promptly and adequately fix flaws in its products. As by far the biggest technology provider for the US government, Microsoft vulnerabilities account for the lion’s share of both newly discovered and most widely used software flaws. Many experts say Microsoft is refusing to make the necessary cybersecurity improvements to keep up with evolving challenges.

Microsoft hasn’t “adapted their level of security investment and their mindset to fit the threat,” says one prominent cyber policy expert. “It’s a huge fuckup by somebody that has the resources and the internal engineering capacity that Microsoft does.”

The Department of Homeland Security’s CSRB endorsed this view in its new report on the 2023 Chinese intrusion, saying Microsoft exhibited “a corporate culture that deprioritized both enterprise security investments and rigorous risk management.” The report also criticized Microsoft for publishing inaccurate information about the possible causes of the latest Chinese intrusion.

The recent breaches reveal Microsoft’s failure to implement basic security defenses, according to multiple experts.

Adam Meyers, senior vice president of intelligence at the security firm CrowdStrike, points to the Russians’ ability to jump from a testing environment to a production environment. “That should never happen,” he says. Another cyber expert who works at a Microsoft competitor highlighted China’s ability to snoop on multiple agencies’ communications through one intrusion, echoing the CSRB report, which criticized Microsoft’s authentication system for allowing broad access with a single sign-in key.

“You don't hear about these types of breaches coming out of other cloud service providers,” Meyers says.

According to the CSRB report, Microsoft has “not sufficiently prioritized rearchitecting its legacy infrastructure to address the current threat landscape.”

In response to written questions, Microsoft tells WIRED that it’s aggressively improving its security to address recent incidents.

“We are committed to adapting to the evolving threat landscape and partnering across industry and government to defend against these growing and sophisticated global threats,” says Steve Faehl, chief technology officer for Microsoft’s federal security business.

As part of its Secure Future Initiative launched in November, Faehl says, Microsoft has improved its ability to automatically detect and block abuses of employee accounts, begun scanning for more types of sensitive information in network traffic, reduced the access granted by individual authentication keys, and created new authorization requirements for employees seeking to create company accounts.

Microsoft has also redeployed “thousands of engineers” to improve its products and has begun convening senior executives for status updates at least twice weekly, Faehl says.

The new initiative represents Microsoft’s “roadmap and commitments to answer much of what the CSRB report called out as priorities,” Faehl says. Still, Microsoft does not accept that its security culture is broken, as the CSRB report argues. “We very much disagree with this characterization,” Faehl says, “though we do agree that we haven’t been perfect and have work to do.”

A Security Revenue ‘Addiction’

Microsoft has earned special enmity from the cybersecurity community for charging its customers extra for better security protections like threat monitoring, antivirus, and user access management. In January 2023, the company touted that its security division had passed $20 billion in annual revenue.

“Microsoft has shifted to looking at cybersecurity as something that's meant to generate revenue for them,” says Juan Andrés Guerrero-Saade, associate vice president of research at security firm SentinelOne. His colleague Alex Stamos recently wrote that Microsoft’s “addiction” to this revenue “has seriously warped their product design decisions.”

These tensions exploded into the open in early 2021, as Congress and the new Biden administration scrambled to understand Russia’s far-reaching SolarWinds hacking campaign.

After breaching government networks through SolarWinds software, Moscow’s operatives fooled Microsoft’s cloud platform into granting them expansive access. Because most agencies weren’t paying for Microsoft’s premium service tier, they didn’t have the network activity logs necessary to detect these intrusions. Lawmakers were outraged that Microsoft was charging the government extra for such a basic feature, and Biden administration officials spent the next two and a half years privately urging Microsoft to make log data free for all customers. Microsoft finally agreed to do so last July—eight days after announcing yet another major hack, this one discovered by an agency paying for log data.

Microsoft won’t say if it plans to make other premium security features free for all of its customers. “We continue to raise the built-in security of our products and services to benefit customers,” Faehl says.

Asked about experts’ arguments that Microsoft’s strategy of profiting off of cybersecurity is incompatible with a security-first mindset, Faehl says, “We would disagree with that characterization.”

A System That’s Everywhere

Microsoft’s dominance has prompted concerns that it represents a single point of failure, concentrating America’s technology dependence in such a way that hackers could easily sabotage essential services by targeting one company’s products.

Few services better illustrate the government’s overwhelming dependence on Microsoft—and an area where some experts say a more diversified approach would be safer—than email. A former US cybersecurity official who works at one of Microsoft’s competitors predicts that an attack crippling Microsoft’s email platform would significantly reduce the government’s ability to operate.

Warnings about a Microsoft “monoculture” date back two decades, but the idea is now attracting new attention from policymakers.

“The US government’s dependence on Microsoft poses a serious threat to US national security,” says US senator Ron Wyden. “The government is effectively stuck with the company’s products, despite multiple serious breaches of US government systems by foreign hackers caused by the company’s negligence.”

Last Monday, Wyden announced draft legislation that would set a four-year deadline for the federal government to stop buying collaboration technology like Microsoft Office that critics say doesn’t integrate well with competing services.

Reducing the government’s reliance on a single vendor wouldn’t just benefit the government, experts say. It would also spread the attack risk across more companies, taking some of the pressure off of Microsoft to protect such a vast portfolio of systems. The giant target on Microsoft’s back makes it a magnet for cybercriminals and government hackers, which helps explain its outsize number of breaches.

The government’s reliance on Microsoft also entrenches a sense of familiarity with its products that cements its places in federal networks. While some agencies are exploring alternatives to Microsoft, most of them are sticking with what they know—largely because it’s easier than switching to an alternative platform, the former cyber official says.

Microsoft denies making it difficult for customers to switch to or incorporate competitors’ products. “Our competitors often stoke subjective complaints about ‘compatibility,’” Faehl says, but “we hear this more from the vendors of some third-party products” than from customers trying to use them.

Regardless, experts say, the upshot is clear: The government is dependent on Microsoft, robbing it of the leverage needed to push back on the company’s practices.

Working the Refs

Microsoft isn’t counting on its market dominance alone to defang government oversight. Since its antitrust battles with the government in the 1990s, the company has crafted a sophisticated public policy strategy that combines earnest calls to protect cyberspace with omnipresent participation in government initiatives.

“Microsoft is by far the slickest operation out there in tech when it comes to these issues,” says Andrew Grotto, a former senior White House cyber official who now leads Stanford University’s Program on Geopolitics, Technology, and Governance and consults for some of Microsoft’s competitors. “They learned this lesson 25 years ago and have been applying it ever since.”

Microsoft’s threat intelligence team, which knows more about malicious cyber activity than virtually any other company and most governments, regularly publishes research about cyber threats and collaborates with law enforcement on operations to dismantle hackers’ infrastructure. The company also helps fund groups like the CyberPeace Institute, which advocates for a safer internet and helps defend nongovernment organizations from hackers. And it has positioned itself as a helpful partner to policymakers who want to take on cyber issues but don’t know where to start, sometimes providing lawmakers with draft legislative language.

With its market dominance and political savvy, Microsoft has ensured that officials almost never publicly criticize it, experts say.

“The government's uncomfortable saying bad things about Microsoft because they're fully committed to them,” says Mark Montgomery, senior director of the Center on Cyber and Technology Innovation at the Foundation for Defense of Democracies, a think tank.

The Biden administration has spoken grandly about wielding the government’s formidable contracting power to force companies to improve their security. But with Microsoft, that leverage is nonexistent, experts say. “There is no realistic chance that the government will wholesale cancel its contracts with Microsoft,” Paul Rosenzweig, a cyber consultant and former DHS policy official, says in an email.

Microsoft disputes this argument. “The idea that the government is too dependent on Microsoft is at odds with reality,” Faehl says.

The government’s lack of leverage means federal officials never use the kind of blunt language found in the CSRB report when discussing Microsoft, even when they insist on speaking to reporters anonymously. The result is a remarkable display of government deference to Microsoft.

After Chinese hackers broke into government email systems and eluded agencies not paying for Microsoft’s premium security features, a senior official at CISA acknowledged that Microsoft’s business model was “not yielding the sort of security outcomes that we seek,” but they declined to directly rebuke Microsoft, instead sticking to talking points about productive conversations with the company.

In fact, despite Microsoft’s yearslong defiance of CISA’s high-profile push for companies to be “secure by design,” CISA has steadfastly refused to criticize Microsoft’s failures. When Microsoft finally bowed to pressure and made logs free last July, CISA director Jen Easterly said she was “extremely pleased with Microsoft’s decision.”

The former cyber official finds the government’s meekness remarkable. “When their own emails are stolen, they don’t seem to push back on the vendor who is the cause of that.”

The White House’s National Security Council declined to comment for this story. In a statement, Eric Goldstein, CISA’s executive assistant director for cybersecurity, says his agency “has a robust partnership with Microsoft and will continue to collaborate in many areas,” while also continuing to “impress upon all technology companies the urgency of developing products that are secure by design so that consumers can trust the safety and integrity of the technology that they use every day.”

Microsoft’s Faehl says his company is “committed to secure by design and secure by default.”

Forcing Change

The CSRB report on Microsoft’s cloud breach calls for dramatic changes to the company’s security culture. According to many experts, it’s time for the government to find its spine and compel those changes.

“Big, powerful companies in general don’t change their behavior unless they’re incentivized to do so,” Stanford University’s Grotto says.

The CSRB report recommends tough new requirements for cloud providers like Microsoft, including periodic security reviews after they receive federal contracts. Experts say those requirements could shift corporate incentives in favor of better security.

Microsoft seems to realize that its recent breaches have sparked a public relations crisis. “We expect and welcome fair scrutiny,” says Faehl. “As an industry leader we must be accountable for the security of our products and services.”

At the same time, he says, Microsoft “wouldn’t mind seeing some scrutiny” of its competitors who “seek to sow fear, uncertainty and doubt about our position as a way to seek advantage for their own products.”

Taking on Microsoft would also be a way for the Biden administration to live up to the principles in its National Cybersecurity Strategy, which prioritizes shifting the burden of cybersecurity onto large, well-resourced tech vendors. “They make the point … that this balance needs to shift,” Grotto says. “The question now is, ‘Okay, what does administration do with that diagnosis?’”

There are signs that the administration is heeding this advice. During a briefing with reporters on Thursday about the possibility that Russian operatives stole government secrets through their latest Microsoft hack, Goldstein said that CISA and other agencies are “are working closely with Microsoft, in alignment with the recommendations of the Cyber Safety Review Board, to drive further progress in Microsoft’s improvement plans with their broader security culture and enterprise.”

In the meantime, experts say, the status quo allows Microsoft to shirk responsibility for problems that it is uniquely capable of resolving.

“No harm comes from doing nothing, at least not to these companies,” Guerrero-Saade of SentinelOne says. “And that’s what’s going to destroy us.”

source
2
Android O.S | Apps / Blackmagic Camera App Set to Finally Come to Android
« Last post by javajolt on April 17, 2024, 05:06:09 PM »
Blackmagic Design has quietly revealed that their Camera app is getting an Android version.


Blackmagic Camera app coming to Android Blackmagic Design

We know, we hear from Apple-heads all the time about how iPhones are the best and only smartphone brand in the world and that texting with your non-iMessage friends is the worst. We’ve also heard from all the Android users in the world pining about how iPhones dominate both news coverage and usually get the more creator-focused apps and features first—or sometimes exclusively.

To make everyone happy now, Blackmagic Design has let us know at NAB 2024 that they’re finally rolling out an Android version of their popular Camera app. Here’s what you need to know.

Blackmagic Camera App for Android


Blackmagic Camera App complete tutorial | ALL SETTINGS EXPLAINED

Speaking with folks from the Blackmagic Design team at NAB 2024, they certainly had quite a bit of news to share with the world this year. From their new URSA Cine 12K to the new box-style PYXIS 6K, to a whole suite of new updates coming to DaVinci Resolve 19, they’ve had a lot of news to cover.

However, perhaps just missed in the mix, Blackmagic has also shared that Blackmagic Camera will be available on Android here soon. Like the iPhone version, it’ll be free and should be available on Blackmagic Design’s website here soon.

source
3


Crooks hijacked a man's cell phone number and then stole money from his bank account using two-factor authentication.
Carolyn Johnson reports for the NBC4 News at 6 p.m. on Monday, April 16, 2024.

source
4


Quick and easy step to transfer C drive to new SSD

Key takeaways

   • Transferring your C drive to a new SSD is a convenient way to move OS to another drive when you upgrade the hard drive or swap to a new device.

   • Cloning is the best and only way to move a C drive to SSD without reinstalling anything, which will make an exact copy of
      your OS and boot the PC on the new SSD successfully.

   • EaseUS Disk Copy is a professional disk cloning software with a simple operation to clone a C drive to a new SSD.

Is it possible to copy only C drive to SSD?

“I’m working to upgrade the primary HDD to a 2TB SSD for my HP desktop. I have a decent amount of software (Windows, Office, Photoshop, Steam / Xbox games, etc.) on my C drive.  Can I do a system restore without reinstalling software or losing my licenses? Will Windows be replicated from HDD to SSD work as a primary drive?” – post from Reddit

The C drive, also the system drive, is the main hard disk partition that contains the Windows Operating System, system-related files, settings, installed applications, logs, and other related data.

However, as it is used longer, the system disk (C drive) will store more data and gradually wear out. As your system drive is full and its storage reaches its limit, you must replace it with a new system disk to expand the capacity.

How to copy and transfer only the C drive to a new SSD if you don’t want to reinstall the operating system? Keep reading and catch the details of this easy task.

Pro tips to effectively move C drive to the other SSD

Before Upgrading to a new SSD, you are supposed to prepare enough to transfer data from old hard drive to new SSD smoothly and successfully. Here are some practical tips. Execute them and get ready now.

1. Clean up C drive – optional but effective

The time it takes to transfer largely depends on how much data is saved on your C drive. Moreover, while swapping a larger disk for a smaller SSD, you must ensure that the used space is less than the available storage on the SSD. To facilitate the process and make use of more storage space, remove these unnecessary, junk, and temporary files as well as applications.

2. Shrink C Drive Partition Volume

Since the HDD is usually larger than the SSD, you should shrink the C drive in disk management in advance if you clone a larger to smaller SSD. By shrinking it, you can decrease the partition space to create unallocated space on the disk.

The steps to shrink C drive.

   • Type Computer Management in the Windows search bar, and click Run as administrator.

   • Select Disk Management under the Computer Management window.

   • Right-click the C drive and select the Shrink Volume option.

   • It will automatically calculate the maximum space you can shrink, and you can also enter the specific size you want to shrink and click shrink to start.



Download SSD data migration software on a Windows computer

To simplify the process of moving the C drive to a new SSD, cloning is the best option, which will create an exact copy of your entire system on the target SSD, and you don’t need to reinstall the operating system and other applications.

EaseUS Disk Copy is one of the best cloning tools that allows you to copy a C drive to an SSD or HDD with simple clicks. It will clone Windows 10 to new SSD and migrate all system data to the SSD with the boot sector, ensuring you can boot your device from it effectively.

It has the following features to make it the perfect choice for a C drive cloning:

   • System clone and partition clone: It supports selecting only the system or a certain partition as the clone source.

   • Disk clone: This feature allows you to clone a whole disk, from HDD to SSD, a smaller SSD to a larger one, or vice versa.

   • Sector-by-sector cloning: Choosing to copy only used space can effectively utilize the space on the target disk.

   • Smart monitor disk size: It will automatically detect both source and target disk sizes, which is very useful when you clone a larger disk to a smaller one.

Download and use to start the C drive cloning to SSD with the following stepwise guide.

4 steps to clone C drive only to a new SSD of M.2/SATA/NVMe

Now, let’s dive into the steps to clone C drive, which involves four simple clicks. We tested and recorded the process, and below are the statistics.



Step 1. Launch EaseUS Disk Copy. Select Partition Mode from the left panel, and choose C drive as the source partition.


Image: EaseUS



Note: C drive is, by default, the system partition on most Windows computers, but there are cases when your system drive and boot drive are saved on separate partitions. e.g., the operating system is stored on the C drive while other system-related files are saved on the D drive. In this case, you must select both partitions to ensure the SSD is bootable.

Step 2️. Select the target partition you want to clone. Check and edit the partition layout, then click Proceed to continue.


Image: EaseUS



   • Autofit the disk means it will automatically adjust the partition size to make it work in the best status.

   • Copy as the source option will copy/clone the same partition layout from your source disk to the destination disk.

   • Edit disk layout allows you to manually resize or move the partition layout on the destination disk.

Step 3️. Click Continue if the program asks to erase data on the destination partition.


Image: EaseUS



Step 4️. The partition cloning or partition copying process is starting now. Wait for the process to finish. When the cloning process finishes, all data in your C drive has successfully migrated to the new SSD.



Can You Move the C Drive Without Using the Cloning Method?

EaseUS Disk Copy makes it simple to clone your C drive to a new SSD. However, if you want to avoid cloning, Windows Backup and Restore (Windows 7) can help you do it effectively. It consists of two major actions:

   • Create a system image on another disk.

   • Install SSD and restore the system image on it.

This manual method requires more steps and time than direct cloning, and you must reinstall programs and reset other settings from scratch.

Since Windows OS lacks a built-in disk/partition migration utility, third-party cloning software is the only way to move OS to a new drive without reinstalling everything. Why not try this convenient method without risking data loss?

The Final words

These are all about how to move the C drive to the new SSD. Our detailed guide covers preparations, the best data migration tool, step-by-step instructions, and post-transfer optimization, resulting in a smooth transition and optimal functionality.

Use EaseUS Disk Copy and take the plunge to enjoy the exceptional speed and responsiveness an SSD brings to your computing experience.

Transfer C drive to new SSD FAQs

1. Can you transfer data from an old SSD to a new SSD?

Yes, data can be transferred from an old SSD to a new SSD. It can be completed by cloning all data of the old SSD onto the new one using an SSD cloning software, ensuring that all files and data are transferred seamlessly without reinstalling.

2. How do I replace my SSD without reinstalling Windows?

To replace your SSD without reinstalling Windows, you can follow these steps:

   • Back up your important data to an external storage device or cloud service.

   • Connect the new SSD and ensure that the new SSD is recognized.

   • Use disk cloning software, EaseUS Disk Copy, to clone the old SSD onto the new one.

   • Once the cloning process is complete, shut down your computer.

   • Disconnect the old SSD and ensure that the new SSD is properly connected.

   • Start your computer; it should boot up with all your data on the new SSD.

3. Will I lose Windows if I replace my SSD?

If you replace your SSD without performing a backup or cloning, you will likely lose your Windows installation. Windows is typically installed on the primary storage device, usually an SSD. However, if you back up your existing SSD or clone it to the new one, you can keep your Windows installation and dat

NOTE: WindowsNewsInfo Group does not endorse any particular software to use in conjunction with your Windows installation! - System Admin

source
5


Microsoft has announced the upcoming end-of-support (EOS) date for Office 2016 and Office 2019 apps, along with related productivity servers. Those apps will no longer be supported after October 14, 2025.

In a blog post, Microsoft stated:

Quote
After this end date, Microsoft will no longer provide security fixes, bug fixes, or technical support. Using products after the end of support leaves your organization vulnerable to potential security threats, productivity losses, and compliance issues.

The blog post listed the many Office 2016 and 2019 apps this new EOS date will affect, along with the server products;

   • Access 2016

   • Access 2019

   • Excel 2016

   • Excel 2019

   • OneNote 2016

   • Outlook 2016

   • Outlook 2019

   • PowerPoint 2016

   • PowerPoint 2019

   • Project 2016

   • Project 2019

   • Publisher 2016

   • Publisher 2019

   • Skype for Business 2016

   • Skype for Business 2019

   • Visio 2016

   • Visio 2019

   • Word 2016

   • Word 2019

   • Exchange Server 2016

   • Exchange Server 2019

   • Skype for Business Server 2015

   • Skype for Business Server 2019

Microsoft is recommending that organizations who have these apps installed instead sign up for a Microsoft 365 E3 cloud-based subscription. If those groups still need to keep their PCs disconnected from the internet and are not yet ready to switch to Microsoft 365, the company does offer the Office Long-Term Servicing Channel (LTSC) solution. However, the EOS date for Office LTSC 2021 is October 13, 2026, so customers get just under a year of additional support beyond Office 2016 and 2019.

Microsoft has announced plans to retire the Publisher app and remove it from Microsoft 365 subscriptions in October 2026.

The company revealed plans to release a preview of Office LTSC 2024 for businesses and organizations sometime in April. It plans to offer five years of support for the stand-alone Office 2024 apps. A consumer version will launch sometime later in the fall of 2024.

source
6


With Microsoft PC Manager, users can easily perform basic computer maintenance and enhance the speed of their devices with just one click. This app offers a range of features, including disk cleanup, startup app management, virus scanning, Windows Update checks, process monitoring, and storage management.

Microsoft PC Manager key features:

   • Storage Manager- easily uninstall infrequently used apps, manage large files, perform a cleanup, and set up Storage Sense to automatically clear temporary files.

   • Health Checkup feature -scans for potential problems, viruses, and startup programs to turn off. It helps you identify
      unnecessary items to remove, optimizing your system's performance.

   • Pop-up Management - block pop-up windows from appearing in apps.

   • Windows Update - scans your system for any pending updates.

   • Startup Apps - enable or disable startup apps on your PC, allowing you to optimize your system's startup performance.

   • Browser Protection - rest assured that harmful programs cannot alter your default browser. Also enables you to change your default browser.

   • Process Management - allows you to conveniently terminate any active process, ensuring optimal system performance and resource utilization.

   • Anti-virus protection - Fully integrated with Windows Security. Safeguard your PC anytime.

Microsoft PC Manager is a free tool optimized exclusively for Windows 10 (version 1809 or newer) and Windows 11.

Download: Microsoft PC Manager 3.3.19.0 | from Microsoft Store

Download: Microsoft PC Manager 3.8.10.0 Beta (offline setup)

View: Microsoft PC Manager Home Page

source
7


Last month, we covered an unofficial utility that lets Windows users upgrade from one Windows edition, say Home to Pro, without having to go through a clean installation. The utility is called "Helper-Tool für Windows 10/11 Inplace-Upgrades und Editionswechsel" which translates to "Helper tool for Windows 10/11 inplace upgrades and edition changes". You can read about it in full in our dedicated coverage.

However, those who don't want to fiddle around with an unofficial app and would much rather prefer safely tweaking with the Registry instead are in for a treat. Windows enthusiast and X (formerly Twitter) user Bob Pony has shared the way to do this. The same user recently shared a one-click trick to bypass the Windows 11 system requirements check on LTSC.

Switching the Edition using the Registry Editor involves changing the value of the subkey EditionID to "Core." On a system that is already running Windows 11/10 Pro, the value of EditionID is set to "Professional."

The CurrentVersion Registry key address is given below:

Quote
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion





Again, tweaking the Registry must be done safely and it's best to create a backup before proceeding with the Registry Editor (regedit) in case something goes wrong.

While we are on the topic of Registry tweaks, Microsoft, last week, published its official mitigation enabler for Spectre variant 2 security vulnerability that is rearing its head up again. If you have an Intel 6th Gen (Skylake) and newer CPU, you can find those details here.

source
8

Windows 11   Windows 10   Windows 8.1

Back up the registry manually

1. Select Start, type regedit.exe in the search box, and press Enter. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

2. In Registry Editor, locate and click the registry key or subkey you want to back up.

3. Select File > Export.

4. In the Export Registry File dialog box, select the location to which you want to save the backup copy, and then type a name for the backup file in the File name field.

5. Select Save.

Restore a manual backup

1. Select Start, type regedit.exe, and then press Enter. If prompted for an administrator password or confirmation, type the password or provide confirmation.

2. In Registry Editor, click File > Import.

3. In the Import Registry File dialog box, select the location to which you saved the backup copy, select the backup file, and then click Open.

source
9
Reportedly one of the biggest ever monthly updates only fixes issues with the latest Windows 11 as the clock ticks on Windows 10.


Windows 11 update (Image: Microsoft/Getty)

This week, Microsoft pushed out a big update for Windows 11 that an expert has claimed breaks a worrying record for the most bugs and flaws fixed in any Windows update since 2017, with 147 different gremlins addressed. Some of the fixes were for bugs that meant hackers could have remotely accessed devices and other vulnerabilities Microsoft listed as ‘critical’, a sure sign the company was worried about users’ security.

147 is a large number of bugs to fix but if you are running Windows 11 then you’re safe, as Microsoft has pushed out the update to your PC. It’s yet another reason to think about upgrading from Windows 10, as the older operating system’s end-of-life date is rapidly approaching.

Windows 10 will stop receiving any software or security updates on 14 October 2025, despite recent data from Statista showing it is the most popular Windows version in use still with a staggering 68 percent of Windows users globally on it. That’s compared to a comparatively meager 27 percent using Windows 11.

Some people cannot upgrade to Windows 11 if their Windows 10 PC is not powerful enough to run the latest operating system. Here are the full requirements for Windows 11:

   • Processor: 1 gigahertz (GHz) or faster with two or more cores on a compatible 64-bit processor or system on a chip (SoC).

   • RAM: 4 gigabytes (GB) or greater.

   • Storage: 64 GB or greater available storage is required to install Windows 11.

   • Graphics card: Compatible with DirectX 12 or later, with a WDDM 2.0 driver.

   • TPM: Trusted Platform Module (TPM) version 2.0.

But others may be holding back from upgrading so as not to change the look, feel, or performance of their Windows 10 computer. That is understandable, but it looks as though Microsoft is forcing those customers into a corner by rapidly updating Windows 11 and planning to leave Windows 10 behind.

It has also been reported that a Windows 10 update pushed out several months ago is still broken and causing people issues.

source
10
ANDROID owners have been urged to delete three dangerous apps that have been masquerading as messengers in the Google Play store.

Cyber researchers at ESET have rung the alarm on a trio of nasty apps that aim to steal Android owners' personal information - and even their banking credentials.


While Google is generally very good at detecting and removing malicious apps - some do slip
through the cracks Credit: Getty


These apps are posing as messaging services and offer basic, but functional services as bait.

At surface level, they work and appear legitimate - but they're not.

Behind the scenes, they are hiding open-source XploitSPY malware.

Hackers have been advertising these apps - and others that are similar - on websites and on the Google Play store.

While Google is generally very good at detecting and removing malicious apps - some do slip through the cracks.

The apps exist to steal contact lists, camera files, location, download data, as well as your WhatsApp and Telegram.

Android owners have been urged to check their devices for these three apps:

   ► Dink Messenger

   ► Sim Info

   ► Defcom

If you have downloaded one of these apps, it is advised to delete them immediately.

They have since been removed from the Google Play store, but may still be lurking on your phone.

They form part of a targeted campaign, which began in November 2021, to distribute malware onto Android phones primarily in India and Pakistan, according to ESET.

source
Pages: [1] 2 3 ... 10