Google is working on an option to replace password logins on mobile devices with a "trust score" based on multiple factors. The idea is to combine all sorts of factors that aren't secure enough on their own. The idea is to balance the need for ... security with the hassle of remembering passwords by building on the concept of two-factor authentication. That's an existing philosophy that deals with the inherent weakness of using a single login factor such as a password. Two-factor authentication combines a password with another factor such as using a specific device or having ... (view more)
Microsoft's attempts to get all users running Windows 10 has taken yet another step further. It's now rolling out a sneaky way of getting users to "consent" to the update. As we've previously covered, Windows 10 is now classed as a "Recommended ... update" which means it will download and attempt to install on all Windows computers where the user hasn't actively changed the update settings from their default. After that reclassification, some users started seeing a pop-up message saying that Windows 10 was ready to install and the scheduled upgrade time. The ... (view more)
Infopackets Reader 'Sisi' writes: " Dear Dennis, After I upgraded to Windows 10, I can no longer connect to my wireless network. However, when I connect my laptop to my router using a ethernet cable, it works fine. How can I get my wireless network ... to work again? " My response: There's a lot of reasons that the WiFi won't work after upgrading to Windows 10. The top two reasons are that the driver for your wireless network adapter needs to be updated, or it's possible that Windows 10 does not support your wireless adapter. With that said, I'll describe a systematic approach to resolving this ... (view more)
A judge has refused Mozilla's request that the FBI be forced to hand over details of a potential security bug in its Firefox browser. Mozilla argued there was a risk of the bug becoming public, which would then put anyone using its browser(s) at ... risk of an online attack. The request follows a separate criminal case involving a website engaged in indecent content depicting children. The site isn't available through ordinary web browsers such as Firefox, but instead runs through the Tor network. The Tor network works using the world wide web, but data is sent on a different channel (so ... (view more)
A major website used by hackers to exchange stolen data has itself been hacked. The breach has exposed hundreds of thousands of user accounts. The site called "Nulled" hosted discussion forums for users to exchange tips on how to hack into websites. ... It also included a section for buying and selling data such as stolen account information. Ironically, given the new development, the site had the slogan "Expect the unexpected." At the time of writing, the site was offline for "temporary unscheduled maintenance," with its database leaked onto other websites for ... (view more)
Google will reportedly face a fine of more than $3 billion for a series of alleged breaches of European competition laws. The penalty would be one-sixth of the maximum that could be imposed, but would still dwarf previous records. The penalty would ... come from the European Commission. Among many other roles, the commission oversees competition rules which apply to firms doing business across 28 European countries. For the record, this is a separate case launched last month , which the European Commission formally accused Google of using unfair rules in the way it pressures Android device ... (view more)
Infopackets Reader Dave C. writes: " Dear Dennis, I am currently running Windows 8.1 and am thinking to get the free version of Windows 10 before the deadline on July 29, 2016. I am currently running Hyper-V on my system and have a very important ... virtual machine that I've compiled. I was wondering if I upgrade to Windows 10, is there a chance that my virtual machine will stop working? I do not want to lose it. " My response: One of the beautiful things about virtual machines is that they are portable. So, if one of your virtual machines grew to eat up a lot of resources (for example), you can ... (view more)
Infopackets Reader Terrel W. writes: " Dear Dennis, I installed Windows 10 on my laptop about 2 months ago. Just recently the laptop has been extremely slow; whenever I click on anything, the cursor will spin for literally 3 to 5 minutes before I am ... able to do anything. Any action I take on the computer - whether it's a right click on the desktop, or launching the browser - results in the same spinning. This is not normal behavior! I have tried the Windows 10 Reset but it gives me an error. Can you help? " My response: I asked Terrell if he'd like me to connect to his system using my remote ... (view more)
Google is to refuse to carry advertising for payday loans companies. It's the biggest such ban for something other than illegal activity or matters of taste. The ban will apply to all Google's advertising systems. That includes both the ads that ... appear alongside search results and the ads that are placed by Google for clients on third party websites. The move however will not stop payday loan companies showing up in search results. Google has defined the affected ads as ones for loans where the repayment is due within 60 days of taking out the loan. While this will apply worldwide, a ... (view more)
Facebook has rejected claims that its staff manually 'suppressed' conservative-slanted news stories in its trending topics feature. That hasn't satisfied a Senate committee which has now demanded more information about how the feature works. The ... feature is the list of news articles that appears on the Facebook web page when users are logged in. It's presented as a list of the news topics and stories that users are most sharing and talking about on the site, with the impression being that its a purely objective ranking based on raw numbers. Trending Topics is separate to the ... (view more)
Two government agencies are investigating the way smartphone manufacturers and wireless carriers issue security updates for devices. They say they are particularly worried about older devices being left unpatched. It's a rare joint probe by both the ... Federal Communications Commission (FCC) and the Federal Trade Commission (FTC). While the FCC usually handles issues relating to the Internet and smartphones, the FTC usually only gets involved in cases of misleading advertising or unfair contracts. That may suggest officials are exploring whether companies have overstated the security their ... (view more)
Infopackets Reader Giovani S. writes: " Dear Dennis, I happened to stumble across your website the other day -- very informative! I am using Windows 10 as my main PC, but I also installed Windows Server 2012 as a virtual machine. I am trying to ... connect to the Windows Server 2012 via Remote Desktop, however, the the UNC path of the Windows Server (\\server2012r2) will not resolve when I try and access it. I have googled this question a million times with a million different 'solutions', but I can't seem to find the answer. The only way I can connect to the Windows Server 2012 using remote ... (view more)
Stolen usernames and passwords from Yahoo, Google and Microsoft's webmail services are reportedly being traded by Russian criminals. They are said to be among a batch of 272.3 million accounts, though most are from a popular Russian service. The ... trade has been revealed by Hold Security in a discussion with Reuters. Hold's founder says his staff uncovered the batch when trawling an online forum used by hackers. The person who provided the information claimed he had a total of 1.17 billion records, but agreed to hand over a portion of them. It seems that while many criminals buy and ... (view more)
Google has been granted access to millions of patient medical records in the United Kingdom. It plans to use it to develop a way to spot patients at risk of developing serious kidney conditions. Although officials say personally identifying details ... will remain encrypted, the move has raised controversy with questions about the scope of the data involved. The records cover every patient who had dealings in the past five years with one of three specific hospitals in London overseen by the same NHS Trust. That's the local organizational body that delivers government-funded healthcare. ' ... (view more)
A federal court has ordered a woman to use her finger to unlock her iPhone. It's the latest legal tussle in the ongoing debate pitting security and law enforcement against constitutional rights. The case involved a Los Angeles woman who had been ... arrested for identity theft. The FBI wanted to access the contents of her phone, which was protected by a fingerprint lock. Officials have not publicly revealed exactly why they wanted to access the data, or whether it directly related to the identity theft charges. Court documents show she was the girlfriend of a known member of a major LA ... (view more)
Infopackets Reader Marion writes: " Dear Dennis, I am running Windows 10 and my Windows Mail won't work; every time I load Windows Mail it just freezes. For example, normally when I load Windows Mail, the left hand side of the screen displays my ... Accounts, Inbox, Sent items, Drafts, and Archives - however, almost all of these headings are completely blank. If I move my mouse over top of each section it will show its heading, but I know that isn't right. I can only see a few items in my Sent box but no mail comes through the Inbox. Any ideas? " My response: I contacted Marion and she agreed to ... (view more)
Microsoft has detailed the intricate and carefully crafted attack techniques of a longstanding group of online spies. They include taking advantage of a now-retired Windows feature for easier updates. Thankfully for home users, the attacks from the ... group Microsoft dubs "Platinum" have been highly targeted at government, defense, communications and intelligence agencies and organizations. That's promoted speculation a government may be behind the attacks. The details come in a report by Microsoft's Windows Defender Advanced Threat Hunting. It notes that while some attacks are ... (view more)
Varying attitudes around the world to cellphone use are reflected in two new policies. India is to mandate 'panic buttons' in cellphones, while a German city has taken drastic measures to keep phone users safer. The Indian rules begin to take effect ... next January when all cellphones on sale will have to include some form of panic button. The measure is designed to deal with growing fears for safety on the streets, particularly among women. Officials reportedly concluded that while cellphones make it much easier to call for help than in the days of relying on payphones, the process of ... (view more)
A new manufacturer plans to sell ultra-secure smartphones for as much as $15,000. They won't be the most expensive ever made, but will be the costliest outside of gimmick "luxury" handsets. Sirin Labs, a company based in the United Kingdom and ... Israel, has raised $72 million in investment funding. It plans to launch its first handset in a dedicated retail store next year. (Source: reuters.com ) The company has released relatively little detail about the handset, but has been working on it for almost three years. It says the big selling point is that it will offer military level ... (view more)
Infopackets Reader 'Lee' writes: " Dear Dennis. I have done a clean install of Windows 10 and downloaded all updates; however, I keep getting a blue screen error message that "CRITICAL_PROCESS_DIED". Prior to that I was running Windows 7 - but also ... had the same error CRITICAL_PROCESS_DIED. I have done several clean installs, but no luck. I've run chkdsk (check disk) and did a memory check - but neither report any errors. I did the 'sfc /scannow', but receive an error that 'windows resource protection found corrupt files but was unable to fix some of them'. Can you please help? " My response: ... (view more)
European officials have formally accused Google of breaching competition rules in the way it handles the Android system. They say the company unfairly used the system to push its search services. The claims come from the European Commission, the ... equivalent of the executive branch of the European Union. It oversees some elements of competition law that apply across 28 countries. The Commission has issued a Statement of Objections, which is formal notification that it is investigating alleged breaches. Google now has 12 weeks to respond to the claims. If found guilty it could face financial ... (view more)
Worldwide PC sales have fallen to their lowest level in almost a decade according to new estimates. It's also now four years since sales rose year-on-year. The figures come from analyst Gartner, which gathers together data from a range of sources. ... Strictly speaking, it estimates shipments to retailers rather than actual sales to consumers and businesses. That can have a lag effect, but doesn't affect overall trends - over the long run, sales affect how many units retailers order. (Source: gartner.com ) According to the company, shipments between January and March this year totaled 64. ... (view more)
The Supreme Court has rejected claims by authors that Google Books violates copyright. It ends a legal battle dating back 12 years. The legal issues originally centered on Google Library, in which the company scanned millions of books that were no ... longer being published and made them available in full. Later on Google used the same technology to scan books that are in print and add them to its search database alongside web pages and other forms of information. When users carry out a search that matches content in a scanned book, they can now see the relevant section as part of the search ... (view more)
Infopackets Reader Todd G. writes: " Dear Dennis, I am using Windows 10 and I have VMWare workstation installed. I have been playing around with a CentOS (Linux) virtual machine for the last few months. When I first created the virtual machine, I ... selected the default size for the operating system which is 8 gigabytes. However, I'd like to create a larger partition because I am running out of space. I am using the Ext4 file system with a logical volume for my primary partition. I tried using gparted to increase the volume size on /dev/sda, but when I rebooted, the 'df -h' command shows that my ... (view more)
Infopackets Reader Sonja S. writes: " Dear Dennis, I have a very perplexing question that has been bothering me for the last little while. For the longest time, I have been using an app called ES File Explorer for my Android smartphone, which allows ... me to connect to a shared Windows folder on my Windows PC using my WiFi connection. However, it appears that ES File Explorer now contains a bunch of bloatware and is constantly scanning my SD Card, and alerting me of programs 'requesting sensitive information'. I was wondering if you can tell me if there is another Android app I can use to share ... (view more)
Amazon has released a luxury version of the Kindle e-Reader, with a price tag to match. It's drawn comparisons to Apple's high-priced iPads, despite being a single-purpose device. New Kindle editions over the past few years have mainly involved very ... small tweaks to an established design. The new Kindle Oasis has been redesigned to be easier to hold. The most notable difference is that the device is no longer a perfectly flat device. One side of it is the thinnest a Kindle has ever been, at barely an eighth of an inch. However, the other side has a tapered bump that takes it up to a ... (view more)
Microsoft is to make the dreaded "Blue Screen of Death" (BSOD) a little less likely to leave people feeling helpless. Users may be able to hold a smartphone up to the screen and get a link to an explanation of the problem. The screen appears when ... Windows encounters a serious problem that causes it to completely crash. When this happens, a blue screen with a cryptic error message is displayed, and sometimes the system will reboot automatically. For the most part, a blue screen involves an incompatibility or fault between Windows and software or a hardware device. At the moment, the ... (view more)
One of the nastiest ransomware variants may have been defeated. Two security researchers have reportedly figured out a way to recover access to an encrypted computer without paying an extortion fee. Most forms of ransomware involve infecting a ... victim's computer and then individually encrypts files. That leaves the victim able to run Windows, but unable to access any of their data. The Petya variant is more dangerous as it encrypts the hard drive's master file table. That's a database which has the details of every files on a computer, including those for Windows itself. If the master ... (view more)
How to Fix: Svchost.exe High CPU Usage Infopackets Reader Ben J. writes: " Dear Dennis, I just reinstalled Windows 7 on my machine, and from the get-go the machine is very slow to use. I ran Windows Task Manager to see what is going on, and the ... svchost.exe process is consuming 50% of my CPU. I have disabled the sleep mode on my computer and let svchost run for a few days, but nothing has come of it - it's still causing high CPU usage. I should also mention that I have not yet received any Windows Updates on my computer for the last week. What is causing the svchost process to run at high CPU ... (view more)
Infopackets Reader Jason B. writes: " Dear Dennis, Thanks for all your excellent articles! Somehow my PC got infected with the Trojan: Trojan.Agent.Gen - it was detected by Malwarebytes Antimalware after I ran a scan. Malwarebytes said it needed to ... reboot to clean the infection; I did that, but after another scan, the Trojan is still on my system - I can't remove it! The filename and path of the Trojan is located at %userprofile%\AppData\Roaming\windows.vbs. I have also tried removing Trojan.Agent.Gen using Microsoft Security Essentials and ADWCleaner, but neither program will remove it and ... (view more)
Infopackets Top Windows 10 FAQs
How to Upgrade from Windows 10 32-bit to 64-bit
How to Fix: Windows 10 Antivirus Missing, Not Compatible
How to Fix: Windows 10 Display Shifted; Screen Fuzzy
How to Upgrade Windows 7, 8 32-bit to Windows 10 64-bit
to Downgrade from Windows 10
- How to Fix: Windows 10 Upgrade Failed Error C1900208
- How to Fix: Windows 10 Upgrade Failed Error 80240020
- Can I Cancel my Windows 10 Reservation and Reserve Later?
- How to Clean Install Windows 10 using Windows 7, 8 License
- Will Windows 10 Install Automatically?
- Windows 10 Upgrade: Do I have to Reinstall Programs?
- Windows 10 Upgrade: Can I choose 32-bit or 64-bit?
- Which Version of Windows 10 Will I Get (Home or Pro)?
- How to Reserve Windows 10 Upgrade (Free)
- How to Fix: CPU Not Compatible with Windows 10 Error
- Windows 10 Upgrade: Can I keep my Old Windows Install?
- How to Cancel Windows 10 Reservation (Properly)
- Download Windows 10 .ISO (DVD) for Clean Install?
- Microsoft: Windows 10 Will Be The Last Version
- Does Windows 10 require the CPU to support PAE?
- Windows 10: Can I Upgrade or do I need a Clean Install?
Click here for more Windows 10 articles.