Microsoft is working on a new File Locksmith PowerToys utility to reveal which processes are using a file
Brace yourself for a new PowerToys utility. Microsoft's developers are busy working away on a new tool called File Locksmith which will be welcomed by anyone who has ever been greeted by a message informing them that a file cannot be deleted because it is being used.
File Locksmith will add a new entry to the context menu in Windows 11 -- "What's using this file?". The tool will then reveal which processes are using the file in question.
Microsoft confirms two actively exploited zero-day vulnerabilities in Exchange Server
Microsoft has issued a security notice about two zero-day vulnerabilities with its own Microsoft Exchange Server. Versions 2013, 2016 and 2019 of the software are affected.
One vulnerability (CVE-2022-41082) allows for remote code execution when an attacker has access to PowerShell; the second (CVE-2022-41040) is a Side Request Forgery (SSRF) vulnerability. Both vulnerabilities are being exploited in the wild.
Microsoft acknowledges printer issues blocking Window 11 2022 Update
It may only be a little over a week since Microsoft released Windows 11 2022 Update, but the problems it is causing are coming thick and fast.
The most recent issue involves printer drivers, and it has caused the company to place a compatibility block on some people upgrading to the latest version of Windows 11. The good news is that there is a relatively simple workaround in the meantime.
Best Windows apps this week
Five-hundred-and-ten in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
The Windows 11 2022 Update has been out of a while and Microsoft confirmed several issues plaguing some users already. One of the issues affected gaming performance on Nvidia-powered systems. Nvidia released an updated driver that addresses these performance issues.
How clean code can help developers prevent vulnerabilities [Q&A]
Every year, thousands of code vulnerabilities are discovered, patched and publicly disclosed to improve security for current and potential users.
But many of these vulnerabilities share common features, so what can developers do to write better code that prevents vulnerabilities from entering their apps and services in the first place? We talked to Johannes Dahse, head of R&D at clean code specialist SonarSource, to find out.
Editable tweets arrive on Twitter
The ability to edit tweets is something that Twitter users have been asking for since the service first emerged. There have long been rumors that the feature is in the works, and now Twitter has taken the wraps off this much-requested option.
News of the tweet edit button was shared via the Twitter Blue account, indicating that -- as thought for some time -- that tweet editing will be limited to paying subscribers, at least to start with.
Google flushes Stadia down the toilet
Today, Google finally flushed Stadia down the proverbial toilet. And yes, the company's streaming game service was, in fact, a massive turd. Consumers never really embraced Stadia, and after a few short years, Google is admitting defeat and shutting it down.
On paper, Stadia looked great -- you could play high-end games without spending money on a console. The games simply streamed over the internet, with Google's servers doing the heavy lifting. Unfortunately, the execution and overall game library was lacking. Stadia was not fun to use or play. And now it is dead, or at least it soon will be.
Microsoft releases Windows 11 Build 25211 with Widget improvements
Ubuntu desktop comes to AWS
Until today Amazon WorkSpaces cloud desktop solution simply offered the option of either Windows or Amazon Linux machines. Now though Canonical has announced the availability of Ubuntu WorkSpaces on AWS.
This is a fully managed virtual desktop infrastructure (VDI) on the public cloud and the first third-party Linux OS to be available on the platform. It gives developers access to a wide choice of open source tools and libraries in cutting-edge fields like data science, artificial intelligence/machine learning, cloud and internet-of-things.
Get '8 Steps to Better Security: A Simple Cyber Resilience Guide for Business' ($18 value) FREE for a limited time
Harden your business against internal and external cybersecurity threats with a single accessible resource.
In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.
Is data a silver bullet for the slowing economy?
During the pandemic, companies with a strong understanding of their business as a whole, including employees, partners, customers and even suppliers, fared better than those without the ability to review and use data to drive growth.
History has shown that the greatest weapon against uncertainty is information. Understanding your business at a microscopic and holistic level is now more important than ever, as the threat of a recession looms. This means that information must be treated as a central tool in leading all businesses through any potential storm.
Less than five percent of Fortune 500 companies are using the latest email standards
Phishing is one of the most common methods of launching a cyberattack, yet new research from Red Sift shows that only a small percentage of publicly traded companies have fully adopted the latest email standards that could protect them and their customers.
DMARC (Domain-based Message Authentication, Reporting and Conformance) and BIMI (Brand Indicators for Message Identification) help prevent spoofing and allow businesses to display their logo on authenticated emails.
Businesses losing revenue to bot-driven account fraud
Revenue loss from bot-driven account fraud and web scraping continues to increase according to a new report, with 69 percent of companies that have a bot management solution report losing more than six percent of their revenue due to account fraud this year.
Account fraud includes account takeovers and new account fraud, where fraudsters create fake accounts to gain access to loyalty programs and take advantage of promotional discounts.
How software innovation will power future energy platforms
In the face of supply uncertainty, increasingly urgent environmental goals and surging price rises, the energy industry finds itself under immense pressure to innovate. At the same time, the competition to attract and retain customers is intensifying, with consumers also looking for an effective digital experience, alongside transparent consumption data and control.
Given these opportunities and challenges, how can the energy industry find fresh and innovative approaches to deliver what each stakeholder wants?
A third of people fall victim to cyberattacks despite training
A new study of 3,000 individuals across the US, UK and Canada finds that although 58 percent of tech users that had access to cybersecurity training or education say they are better at recognizing phishing messages and related attacks, 34 percent still fell victim to at least one type of cybercrime.
The research from The National Cybersecurity Alliance and CybSafe shows that of more than 1,700 incidents of cybercrime that were disclosed by participants, 36 percent were phishing attacks that led to a loss of money or data, while 24 percent report falling victim to identity theft.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.