Microsoft releases KB4578013 to fix two Windows Remote Access Elevation of Privilege vulnerabilities


Microsoft has released an out of band security update that addresses two separate Windows Remote Access Elevation of Privilege vulnerabilities.
KB4578013 fixes the CVE-2020-1530 and CVE-2020-1537 issues relating to Windows Remote Access' handling of memory and file operation respectively. Microsoft had already issued a patch for Windows 10 earlier this month, but the new patch is aimed at people running Windows 8.1, RT 8.1, and Server 2012 R2.
Gmail is down, along with Google Drive, Docs, Meet and more


Numerous Google services have been plagued with server issues causing problems for users around the world.
As well as being unable to send emails in Gmail, people are complaining that they are unable to upload files to Google Docs. Other services affected by the outage include Google Meet, Google Voice, and Google Keep.
ADATA announces a pair of fast-charging USB power banks with a lot of juice


Electricity is something we all take for granted -- you flip a switch and you instantly have light. It is like magic, if you think about it. When there is a blackout, however, we all quickly realize how dependent we are on electricity. Just recently, in the Northeastern USA, Tropical Storm Isaias wreaked major havoc. Here on Long Island (where I live) many folks were left without power for days. Not only did many families lose all of their refrigerated and frozen groceries, but they couldn't charge their smartphones either.
This is why it is essential that everyone own at least one USB power bank for emergencies -- during a blackout, you will be glad when you can charge your phone. ADATA recently launched two new USB battery packs with digital displays that should fit the bill. Called "P20000QCD" and "P10000QCD," the former offers a 20,000mAh battery, while the latter has 10,000mAh. They both have two USB-A ports, but P20000QCD also has two USB Type-C ports. The P10000QCD only has a single USB-C.
Kaspersky 2021 strengthens VPN and stalkerware protection, updates free Security Cloud solution


Kaspersky’s rollout of its 2021 product line has reached European shores with the release of Kaspersky Internet Security 2021, Kaspersky Total Security 2021, and Kaspersky Security Cloud 2021 Free. The latter is a brand-new entry package into the company’s new cloud-based security product line.
There are several new features of note including major improvements to its 'stalkerware' detection tool in Internet Security and Total Security as well as access to the free version of Kaspersky Password Manager in lower-end packages. Security Cloud users also gain automatic checks of potentially compromised online accounts, while the recently introduced Kaspersky VPN component gains a major UI overhaul and more efficient connection process.
Microsoft Inspire key takeaways


Microsoft wrapped its annual Microsoft Inspire 2020 partner conference in July. This is one of the first events of the "big tech" conference season and a good precursor to what trends we can expect to see in 2021. For the first time ever, the global event was 100 percent virtual and available to all attendees at no cost. While Microsoft offered less "net-new" vision at this year’s conference, it strongly reinforced the company’s existing reputation as the dominant technology platform for enabling business results for technology intensive companies globally.
Microsoft spends millions on market research and R&D and based on past events we have found that there is a lot to learn at these events that can add value to technology strategies and plans. Here are four key takeaways from Microsoft Inspire 2020 that capture what Microsoft is up to, the direction the company is taking and often a good indicator of the market over the next 12 months.
Shadow IT in the 'Age of Coronavirus'


"May you live in interesting times!" This is one of the expressions that has received a lot of airtime in recent months. Clearly as a society we weren’t prepared for a pandemic and all the collateral impact that has resulted. But spare a thought for the IT and security teams that have recently dealt with perhaps the "most interesting" times. Everything they knew and trusted about their environment changed overnight. Think: remote workers, new insider threats and challenges associated with shadow IT.
To be fair, shadow IT was already a problem before the pandemic; our research shows the typical organization is aware of less than 50 percent of the digital assets that exist in their environment. However, in their race to ensure access to data and systems needed while sheltering in place, many end-users (inadvertently perhaps?) added significantly to the shadow IT problem. All of this is occurring as attacks have escalated with adversaries trying to take advantage of the chaos. So, what’s a security team to do about it?
Win-KeX is a graphical desktop environment for Kali Linux running in Windows Subsystem for Linux


When Microsoft updated Windows Subsystem for Linux to version 2, there was a lot for developers to take advantage of.
Among those making good use of the fact that a genuine Linux kernel is now virtualized in WLS 2 is the team behind Kali Linux. They have created a new package called Win-KeX that gives the distro a graphic desktop environment, and it comes alongside the release of Kali Linux 2020.3.
70 percent of ICS vulnerabilities can be exploited remotely


A new Biannual ICS Risk and Vulnerability Report, released today by Claroty, reveals that more than 70 percent of industrial control system (ICS) vulnerabilities disclosed in the first half of 2020 can be exploited remotely.
Earlier this week we looked at how project files can be used to attack ICS systems even if they're air-gapped, but this report highlights the importance of protecting internet-facing ICS devices and remote access connections.
Why corporate communication tools are the new threat vector [Q&A]


In the new normal world where more work is being carried out remotely, corporate communications have increased in importance but they have also come under greater threat.
As the recent Twitter attack shows, communication tools offer hackers an attractive extra method of getting hold of sensitive information like login details.
Microsoft teases a stunning new Windows 10 Start menu


Microsoft rolled out an updated Windows 10 Start menu to Windows Insiders a month ago, and that menu is now available to all -- if you follow these instructions. The tweaked design removes the solid color backplates behind the logos and adds a translucent background to tiles.
However, it could be that bigger changes are afoot. In a video showcasing Microsoft’s new icon system the search giant also reveals a stunning new-look Start menu.
Plugable launches UD-3900PDZ Triple HDMI Display USB-C Docking Station


USB-C docking stations are rather common these days. In fact, sites like Amazon are littered with countless makes and models. Of course, not all of them are good, nor are they all the same. Features can vary from dock to dock, such as the number of USB ports or video outputs.
Speaking of video output, most USB-C docks have either one or two such ports. Today, however, Plugable launches a docking station with three HDMI ports, and yes, they can all be used simultaneously for a triple monitor configuration. Despite having so many video outputs, it doesn't skimp on other useful ports.
61 percent of networks vulnerable to low-skilled hackers


Almost half of all actions by attackers are identical to the normal activities of the users and admins, and in most companies even a low-skilled hacker can obtain control of the infrastructure.
These are among the findings of a new study from penetration testing specialist Positive Technologies. Testers, acting as internal attackers, managed to obtain full control of infrastructure at 23 tested companies usually within three days.
New bot detection feature helps fight credential stuffing


Credential stuffing attacks rely on stolen account credentials from a previous breach and are usually perpetrated by bots in an attempt to gain access to other websites.
This is a major problem for businesses, with threat actors using as many as 65,000 IP addresses for a single attack. Now though identity platform Auth0 is launching a new Bot Detection feature that it claims can reduce the effectiveness of a credential stuffing attack by as much as 85 percent.
How to remove Edge tabs from the Alt-Tab switcher in Windows 10


If you're an Edge user who frequently has a large number of tabs open, Microsoft's decision to add the browser tabs to Alt-Tab switching creates something of a navigation nightmare.
When you have not only multiple browser tabs open, but also numerous applications, Alt-Tabbing your way through them can take an age. Thankfully it is possible to hide Edge tabs in Alt-Tab, or limit the number of tabs that are displayed so things don't get too overwhelming.
Microsoft is finally ditching Internet Explorer and legacy Edge


With Internet Explorer having shown its age for a very long time, and with Microsoft pushing out the new Chromium-based version of Edge, it is little wonder that the company is ready to kill off its older browsers.
Microsoft has now set out its timetable for sunsetting legacy Edge in Windows 10 and the dropping of support for Internet Explorer. The changes start later this year, and in twelve months' time the process of moving on will be complete -- from Microsoft's point of view, at least.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.