Microsoft issues another bug-fixing update for PowerToys for Windows 10
It's only a couple of weeks since Microsoft released PowerToys v0.19.0, and the company has now pushed out its second bug-fixing update to the collection of utilities.
Just last week, v0.19.1 addressed a range of issues with the Windows 10 tool collection, and now v0.19.2 has landed. Among the changes are fixes for PowerToys Run and FancyZone, and it also addresses an issue that caused high CPU usage.
80 percent of companies see more cyberattacks during the pandemic
Since the onset of the COVID-19 crisis earlier this year 80 percent of companies have seen 'slightly to considerably more' cyberattack attempts, breaking down to 88 percent in the US and 74 percent in the UK.
SIEM specialist Exabeam surveyed more that 1,000 IT security professionals at small- to medium-sized enterprises and finds that a third of respondents experienced a successful cyberattack during COVID-19, leading to network downtime for 40 percent of UK companies and 38 percent of US companies.
Microservices take off as businesses taste their success
The use of microservices is succeeding for 92 percent of organizations according to new research from learning resources company O'Reilly.
It surveyed over 1,500 software engineers, systems and technical architects, engineers, and decision-makers from around the globe and finds that 77 percent of respondents have adopted microservices.
Thunderbird 78 unveils major UI changes, restricts add-ons to MailExtension API only
Mozilla has released Thunderbird 78.0 for Windows, Mac and Linux. It’s the first major update of the popular open-source email client since August 2019, and is only available as a direct download -- existing users of the Thunderbird 68.x series are advised to wait for a future release that will provide an upgrade path.
A host of new and changed features have been implemented, although the long-heralded built-in support for OpenPGP encryption has been disabled by default for now due to some outstanding issues.
Check Point works with Zoom to fix 'Vanity URL' vulnerability
Researchers at Check Point have been working with Zoom to to fix a security issue that would have allowed hackers to manipulate organizations’ customizable Zoom 'Vanity URLs'.
The vulnerability would allow attackers to send legitimate-looking meeting invitations, with the aim of inserting malware and stealing data or credentials from unsuspecting victims.
Microsoft releases a fix for Outlook crashes after a problematic update causes issues for many users
Microsoft's track record with updates for Windows has been a little wobbly of late, with many updates introducing problems, or creating more issues than they fix. But it seems that it is not just the famous operating system that is jinxed -- Outlook is too.
Following reports from users that the Outlook desktop app was crashing with a 0xc0000005 error, Microsoft launched an investigation. While the company is now in the processing of pushing out a fix, a workaround has been shared online for those affected.
Twitter staff targeted by 'coordinated social engineering' attack as hackers hijack verified accounts in Bitcoin scam
Overnight, Twitter suffered a massive attack by hackers who tried to use the verified accounts of celebrities and high-profile users to execute a Bitcoin scam. The likes of Barack Obama, Joe Biden, Elon Musk, Bill Gates and Kanye West had their accounts hijacked and message were posted promising that if people sent money to a Bitcoin wallet, they would get double the amount back.
Needless to say, it was a crypto scam, and Twitter took the extraordinary steps of preventing all users with a blue tick from tweeting. Twitter now has control of the situation and says that the attack came after staff fell victim to social engineering, enabling hackers to gain access to internal tools which were then used to take over key accounts.
Silicon Power unveils UD70 M.2 2280 PCIe Gen3x4 NVMe SSD
Another day, another solid state drive. Yes, folks, we are once again telling you about a new SSD. There sure are a lot of new models hitting the market lately, right? This time, the drive is from Silicon Power. We recently reviewed one of that company's external SSDs, but I digress.
Called "UD70," it is a PCIe 3.0 SSD that uses 3D QLC NAND. Unfortunately, it is not a PCIe 4.0 drive like the company's similarly named US70. While a PCIe Gen 3x4 SSD is nothing out of the ordinary, Silicon Power boasts about it having superior cooling capabilities. No, it doesn't have a huge heatsink. In fact, it has no heatsink at all. Actually, SP says the cooling capabilities are baked into the UD70's firmware.
Microsoft releases Windows 10 Build 20170 to the Dev Channel with sound and search improvements
Yesterday, Microsoft rolled out a new Windows 10 Build to the Beta Channel (what used to be the Slow ring) and today the software giant follows that up with a new flight on the Dev Channel (previously the Fast ring).
Build 20170 introduces a couple of new features, but won’t be offered to Insiders running PCs with AMD processors due to a bug affecting overall usability.
Phishing attacks for the COVID-19 era: What to look out for
Despite the devastating recent outbreak of the novel coronavirus, phishing attacks continue to drag us and our businesses down. So how exactly do COVID-19 related phishing attacks work?
Cybercriminals have taken it upon themselves to wreak havoc and feed off the fears people have about the virus. Emails are being sent that ask their targets to open attachments containing information about the latest coronavirus statistics or news. Or, they claim to be from legitimate companies offering information about COVID-19.
All about quantum-safe certificates
The advent of quantum computers will render ECC and RSA encryption algorithms obsolete, requiring companies to migrate their computing systems and PKI infrastructure to new, quantum-safe cryptographic algorithms.
This migration of PKI solutions to quantum-safe crypto algorithms will pose many major challenges for many enterprises. All existing applications and systems will need to be updated to support the new quantum-safe algorithms now being developed in response to the threats posed by quantum computers. The process of updating to new algorithms requires significant engineering work and many systems will require extensive updates.
Can AI replace white collar jobs?
Let’s start with the definition of "REPLACE," from Merriam-Webster: To restore to a former place or position (e.g. replace cards in a file); To take the place of especially as a substitute or successor; To put something new in the place of (e.g. replace a worn carpet).
Now, let’s check the definition of "ENHANCE": To increase or improve in value, quality, desirability, or attractiveness (e.g. enhanced the room with crown molding); To increase or improve (something); To make greater or better (e.g. the products claim to enhance beauty).
How to securely comply with rising CCPA rights requests amid COVID-19
As California Consumer Privacy Act (CCPA) enforcement officially started July 1, affected enterprises (based on size, California customer base and business type) can no longer delay complying with the new law. CCPA grants California residents an array of new rights, starting with the right to be informed about what kinds of personal data companies have collected and why it was collected.
A June 2020 survey found that more than 20 percent of organizations were either somewhat unlikely to be, very unlikely to be, or didn't know if they would be fully compliant with CCPA by July 1. With only 14 percent of respondents CCPA compliant and nearly one-third of organizations just starting to plan for CCPA, enterprises need to be prepared for enforcement sooner than later to uphold the rights of California consumers and avoid non-compliance penalties, which can reach up to $7,500 per violation.
Digital communications strategies given a six year boost by COVID-19
The coronavirus crisis has led to many changes in working patterns. But what's its effect on the longer term strategies of businesses?
Cloud communications platform Twilio surveyed over 2,500 enterprise decision makers globally to gauge the effect of the pandemic on their companies' digital transformation and communication roadmaps.
VPN with 'strict no-logs policy' exposed millions of user log files including account passwords
An unprotected database belonging to the VPN service UFO VPN was exposed online for more than two weeks. Contained within the database were more than 20 million logs including user passwords stored in plain text.
User of both UFO VPN free and paid services are affected by the data breach which was discovered by the security research team at Comparitech. Despite the Hong Kong-based VPN provider claiming to have a "strict no-logs policy" and that any data collected is anonymized, Comparitech says that "based on the contents of the database, users' information does not appear to be anonymous at all".



