software

Tue
15
Feb
John Lister's picture

Fake Microsoft Site Distributes Bogus Windows 11

Security experts have reminded users to take extra care when sourcing installation files for Windows 11. A look-alike "Microsoft" site was actually distributing some nasty malware. Normally such scams tend to mainly work on people who are either ... trying to get round paying for software or are trying to get early access without going through official test programs. That's not quite the case with Windows 11 where people running "incompatible" machines can still upgrade to the system by downloading official files and creating a USB installation. However, when some people came looking for Windows ... (view more)

Mon
17
Jan
Dennis Faas's picture

How to Keep Your Business Secure in 2022

More than ever before, modern businesses rely on technology. Their efficient functioning relies on Internet services, which is unlikely to alter in the near future. As a result, as organizations get larger, computer networks develop, and massive ... volumes of data are sent every day between computer systems. According to a survey conducted by Accenture, 68% of organizations across various industries believe that cyber security threats are growing. According to an FBI assessment, cyberattacks have grown by 300% since the epidemic began. Securing businesses large and small is vital to ensure the ... (view more)

Tue
21
Dec
John Lister's picture

MS Office 2019 Pirates Get 365 Discount

Microsoft appears to be offering discounts on legitimate software to people running pirated copies. The Office deal isn't quite a like-for-like offer however. The offer, spotted by the Ghacks site, appears to be limited to users in specific ... countries. It's not clear if there's a pattern such as targeting countries with high rates of piracy, or those where people are likely to have enough money to buy legitimate software. (Source: ghacks.net ) A message shown to some users of unlicensed copies of Office 2019 in the ribbon bar reads "Get up to 50% off. For a limited time, save up to 50% on a ... (view more)

Fri
08
Oct
Dennis Faas's picture

12 Must-have Utilities for Marketing Beginners

New to marketing? Short on time? Need to boost your time management and organizational skills? Look no further! It's a fact: marketing specialists heavily rely on the web and Internet-centric apps to collect, analyze, categorize, and interpret data ... based on thousands of different indicators. These utilities help with content marketing and also to plan, schedule, and communicate - especially if working with a team. If you are new to Internet marketing, it's easy to become overwhelmed because there are so many options online. But fear not: we've got a list of 12 of the best tools that will help ... (view more)

Tue
18
Aug
John Lister's picture

Microsoft and Kaspersky Top List in Security Test

An independent test found tools from most leading security software companies failed to detect all threats - though it was one of the best set of overall results ever. The SE Labs test used simulated attacks based on real threats that are particular ... problems right now. The tests ran between April and June this year and involves anti-malware products aimed at the general public from 14 companies. Though SE Labs runs such tests regularly, it changes the simulated threats each time to reflect what's actually happening in the cyber security world. (Source: selabs.uk ) In many cases, the simulated ... (view more)

Wed
15
Jul
John Lister's picture

Windows 10 May Get Key Security Boost

Microsoft is testing a new Windows 10 security measure that could neutralize a malware technique. It's called Kernel Data Protection and will protect part of a computer's memory from tampering. The idea is to protect two key software parts of a ... computer: the operating system kernel and drivers. The kernel is the most central part of a system and acts a little like a central command point, deciding what the computer does at any precise moment. Meanwhile, drivers control the way the operating system communicates and interacts with hardware devices. Within the computer's memory, the kernel is ... (view more)

Wed
15
Jan
John Lister's picture

Critical Windows 10 Bug Needs Immediate Fix

The National Security Agency (NSA) has told Microsoft about a major Windows 10 bug which also affects Windows Server 2016 and 2019. A patch is already available and is a must install. For the NSA to tell Microsoft about a Windows vulnerability and ... then discuss it publicly is relatively rare. In the past, the NSA has used such security flaws to take advantage of potential suspects, as part of its surveillance program. In this case, the bug was so serious the NSA seems to have concluded any benefits it could gain itself would be more than wiped out by the threat to the general public (and US ... (view more)

Thu
26
Dec
John Lister's picture

Report: Most Facial Recognition Software 'Racist'

Facial recognition software may be less accurate when dealing with non-Caucasian faces, according to a new study. The National Institute of Standards and Technology (NIST) noted the problem was likely the data used to "train" algorithms. The NIST ... examined 189 algorithms from 99 different developers, which it says is a majority of all commercially available systems. (Source: bbc.co.uk ) In the testing, it looked at two tasks. Specifically, they looks to see if two specific photographs are of the same person. In one example, it was to verify identity in order to unlock a phone or check a ... (view more)

Wed
15
May
John Lister's picture

Researchers: Android Bloatware a Security Risk

Unwanted pre-installed software on Android devices often poses privacy and security risks according to a new study. That's because the so-called "bloatware" often by-passes Google's vetting process. One of the key selling points, or big drawbacks - ... depending on your perspective - of the Android operating system is that phone and tablet makers can customize their own devices, through the user interface and the apps that appear when a new device is first powered on. That's different from systems such as Apple, where both the hardware and software are controlled by the same company . The study ... (view more)

Thu
21
Feb
John Lister's picture

Symantec: Popular Microsoft Apps Hijack PCs

At least eight apps in the official Microsoft Store were secretly designed to use a computer's resources without permission. It undermines Microsoft's efforts to promote the store as a "safe source of software." In the past few years, Microsoft has ... heavily pushed the idea of Windows users getting software from an app store - similar to the way mobile devices work - rather than the more traditional method of getting programs from a third-party sources and installing them directly to the PC or smartphone / tablet. There's even a special 'S' mode for Windows 10 that only allows the ... (view more)

Pages

Subscribe to RSS - software