Search Results for: xp

How to run Microsoft Copilot on older versions of Windows -- including XP, Windows 7, and Vista

While some Windows 11 users might prefer not to have Copilot included in Microsoft's latest operating system, there are also those using older, unsupported versions of Windows who would like to try the tech giant's AI assistant, if only to see what all the fuss is about.

Although Microsoft doesn’t provide Copilot for the likes of Windows XP, Windows 7, Vista, or Windows 8.1, you can still install and run it yourself.

Continue reading

Google exposes Iranian cyber threats aimed at U.S. and Israel

Google's Threat Analysis Group (TAG) has recently illuminated the ongoing cyber espionage activities of APT42, an Iranian government-backed group linked to Iran’s Islamic Revolutionary Guard Corps. This cyber collective has intensified its phishing campaigns against high-profile targets in Israel and the United States, particularly focusing on individuals connected to the upcoming U.S. presidential elections.

In detailed findings released by TAG, it was revealed that APT42 has been targeting current and former officials, diplomatic circles, political campaigns, and influential figures within academic and non-governmental organizations in both nations. The U.S. and Israel combined represent about 60 percent of APT42’s cyber operations in the last six months.

Continue reading

Microsoft exposes vulnerabilities in OpenVPN -- millions of devices at risk

Microsoft researchers have revealed a series of medium-severity vulnerabilities within OpenVPN, an essential open-source VPN solution embedded in myriad routers, PCs, and smart devices worldwide. The vulnerabilities, if exploited, could allow attackers to execute remote code and escalate privileges, gaining unauthorized access to potentially millions of devices.

The research team demonstrated how these vulnerabilities could be chained together to form a potent attack sequence, culminating in attackers taking complete control over affected devices. This complex attack vector requires user authentication and a sophisticated understanding of OpenVPN’s architecture, highlighting the need for robust security measures.

Continue reading

Thousands of industrial control devices exposed online

Industrial computer system

Recent attacks have highlighted the vulnerability of industrial control systems to attack and a new report has found 18,000 exposed devices that are likely used to control industrial systems.

The report, from internet intelligence platform Censys, focuses on ICS devices in the US and UK and also finds that almost 50 percent of the human-machine interfaces associated with water and wastewater systems (WWS) identified could be manipulated without any authentication required.

Continue reading

Watch Windows XP running on Apple Vision Pro

For years, Apple famously prevented emulators from appearing in the App Store, but recently it has begun allowing them there. If you’ve ever wanted to play classic games on an iPhone, well, now you can.

Although most people will want to use emulators to play games it’s also possible to use them to run operating systems for one computer inside another.

Continue reading

Nation-state actors exploit political tension to launch phishing campaigns

A new report from phishing protection specialist Bolster identifies 24 separate nation-state threat actor groups attempting to exploit rising political tensions across the US to interfere with the 2024 presidential elections.

Attackers are leveraging AI to automate mass spam campaigns, and also to reply in real-time. This targeting and interactivity at scale increases their chances of gaining access to more sensitive data. The influx of election-themed spam is a significant cyber threat, causing widespread confusion among citizens and undermining trust in legitimate election communications.

Continue reading

RICOH Meeting 360 V2 enhances virtual meeting experiences with integrated video conferencing technology

PFU America, Inc. has launched the RICOH Meeting 360 V2. It is designed to improve the experience of hybrid meetings, offering 360-degree panoramic views and omnidirectional audio capabilities. This technology aims to make online interactions more inclusive and effective by providing lifelike meeting environments.

Featuring advanced speaker detection, the Meeting 360 V2 automatically focuses on the current speaker and adjusts the screen layout to keep the meeting engaging. This device supports flexible work arrangements, increasingly common in today's work culture.

Continue reading

Cyber threats we can expect at the Paris Olympics

Nation state-sponsored threat actors, organized cybercriminal cartels and hacktivists are expected to be active during the upcoming 2024 Paris Summer Olympics and Paralympics, which will be hosted against a fractured geopolitical landscape, including Russia's war in Ukraine and Israel's conflict with Hamas. There will likely be three types: 

Nation-state sabotage: Russian nation state-level cyber units will likely attempt to sabotage the 2024 Games, something that we have already observed in previous years during both the 2018 Winter Olympics as well as the 2020 Tokyo Summer Olympics in which Russia’s GRU military intelligence service engaged in cyber reconnaissance, targeting officials and organizations involved in the events. With Russia being suspended from participation as a sanction from the International Olympic Committee for its invasion of Ukraine, operations launched by Moscow-aligned cyber forces, such as Sandworm (a group that attacked previous events with the “Olympic Destroyer” malware), will likely surge in retaliation. Motivation for these efforts would likely include retaliation, damaging the reputation of the Paris Olympics to promote its own 2024 World Friendship Games in September, and to counter French President Emmanuel Macron’s pro-Ukraine position.  

Continue reading

Cloud and AI expansion lead to data protection challenges

Enterprise IT leaders are grappling with unprecedented challenges in data protection and governance, driven by the rapid adoption of cloud applications and generative AI, according to a new report.

The study from backup and recovery platform Keepit finds that although 70 percent of respondents report that their financial applications are covered by data protection strategies, a significant portion of other key systems and custom applications remain vulnerable.

Continue reading

How DevOps teams can get ready to explore DORA [Q&A]

It's essential for businesses to get security, privacy and governance right -- not only to prevent breaches, but also comply with increasing numbers of regulations.

DevOps Research and Assessment (DORA) best practices are the gold standard for spotting vulnerabilities across both cloud and mainframe environments and improving development efficiency.

Continue reading

Resurrecting Internet Explorer -- the nasty threat impacting potentially millions of Windows 10 and 11 users

Check Point Research (CPR) has identified a critical zero-day spoofing attack exploiting Microsoft Internet Explorer on modern Windows 10/11 systems, despite the browser's retirement.

Identified as CVE-2024-38112, this vulnerability allows attackers to execute remote code by tricking users into opening malicious Internet Shortcut (.url) files. This attack method has been active for over a year and could potentially impact millions.

Continue reading

Plugable USBC-TRAN USB 3.0 Transfer Cable with USB-C Adapter is compatible with Windows XP through Windows 11

Plugable has launched its latest product, the USB 3.0 Transfer Cable with USB-C Adapter (USBC-TRAN), tailored to simplify the process of data migration and syncing across various Windows computers. As an upgrade from the previous USB3-TRAN, the new cable features compatibility with both USB-C and USB-A ports, making it versatile for use with modern and legacy Windows systems.

Designed to support Windows versions from XP through to the latest Windows 11, in both 32-bit and 64-bit configurations, the USBC-TRAN offers comprehensive coverage for all user needs. It comes equipped with Bravura Easy Computer Sync software which can be installed on an unlimited number of PCs, allowing for seamless and unrestricted data transfer of any size -- ideal for both personal and professional settings where frequent data migration is necessary.

Continue reading

How AI is changing the customer service experience [Q&A]

Artificial intelligence is having an impact on more and more areas of our lives. In the customer service field it's increasingly being used to improve customer experience and create more effective interactions.

But how good is AI at dealing with customers? And are businesses using it effectively? We spoke to Josh Kim, co-founder and CEO of AI-based chat and customer experience platform Channel Talk, to learn more.

Continue reading

Canonical Firefighting Support offers expert troubleshooting for Ubuntu Linux systems

Canonical has introduced Firefighting Support, a service specifically designed for organizations that manage their own infrastructure but require expert assistance for troubleshooting Ubuntu systems. This service, billed annually per node, provides rapid response times and comprehensive support, including Ubuntu Pro.

Firefighting Support ensures that customers receive help from Canonical Managed Solutions engineers within an hour of reporting a high-severity issue, facilitated through video calls. This service also includes Ubuntu Pro + Support, offering 24/7 assistance for selected products without additional fees, ensuring continuous and reliable support.

Continue reading

Tor Browser 13.5 revamps Android connection experience, introduces 'Betterboxing' feature

The Tor Project has announced the release of Tor Browser 13.5 for Windows (both 32-bit and 64-bit), Mac, Linux, and Android. The browser gives users the ability to browse the internet through the open Tor network to increase personal privacy.

Tor Browser 13.5 focusses on some changes to the Android browser’s connection experience ahead of a planned implementation of 'Connection Assist'. It also aims to make its letterboxing feature -- a means of resizing the browser window without being fingerprinted -- more user-friendly.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.