computers

Mon
05
Feb
John Lister's picture

Windows 10 Support Deadline Raises Questions

Windows 10 devices are set to become insecure next year unless users pay an extra fee. But with warnings of 240 million devices "going to landfill", it remains possible Microsoft will blink at the last moment. That Windows 10 reaches the end of its ... support period on October 14, 2025 is no secret: it's long been on Microsoft's support calendar and is in line with the company's policy of 10 years support. From that date, Microsoft will no longer issue free security updates. As happened with Windows 7, Microsoft will offer a paid update service for people in "circumstances that could prevent you ... (view more)

Tue
27
Oct
John Lister's picture

Microsoft Reroutes Internet Explorer to Edge

Microsoft is doing its level best to kill off Internet Explorer. Users of the browser will soon find many key websites automatically open in the Edge browser instead. There hasn't been a new edition of Internet Explorer since 2013 and it's ... understandable many people would think it had died out altogether with Microsoft putting all its efforts into Edge instead. However, Statcounter estimates that more than 2.5 percent of desktop and laptop computers are running Internet Explorer. It's harder to estimate the total number of computers, but it's plausible the number of people using Internet ... (view more)

Wed
29
Jan
John Lister's picture

Malware Botnet Mysteriously Hijacked

A malicious network of 500,000 computers used to spread malware around the globe has been taken over by do-gooders in an apparent hijack meant to foil cyber criminals. Victims of the botnet have not only found the stealth malware removed from their ... system, but are also receiving an on screen warning to update their computers. It appears the malware creators are themselves the victim of a hack attack by an online vigilante. Phorpiex Botnet a Decade Old, 500k Strong The malware concerned is distributed through the Phorpiex botnet, which has been operating for nearly 10 years. A botnet is a ... (view more)

Thu
09
Jan
John Lister's picture

Cyber Attack Fears Rise Over Iran Conflict

Cyber analysts warn Iran may further target the US with cyber attacks as tensions rise in the Middle East. While one federal website has already been compromised for propaganda purposes, the real danger may be to infrastructure, with businesses and ... home users caught in the crossfire. The most eye-catching attack this week involved the website of the Federal Depository Library Program, which was altered to show and Iranian flag and an unflattering picture of the President. However, this doesn't appear to be a particularly sophisticated breach and may well have been the work of amateur hackers ... (view more)

Wed
27
Nov
John Lister's picture

Buggy SSD Hard Drives Could Self-Destruct in 3 Years

A hard drive manufacturer has warned its solid state drives could effectively self-destruct after a little less than four years of total operation. HPE (Hewlett Packard Enterprise) says users need to apply a firmware fix immediately, while it's ... another reminder of the importance of backups. 20 different HPE models are affected, all in the SAS range, which are hard drives typically meant for enterprise. All are solid state drives, which have no moving parts. This makes them more expensive and much faster than traditional hard drives. (Source: hpe.com ) The problem isn't with the actual drives ... (view more)

Tue
19
Feb
John Lister's picture

Windows 7 Users: Get this Critical Update (due March)

Microsoft has warned an update coming next month is absolutely critical for users running Windows 7. Without it, computers won't be able to use any future Windows security and feature updates, leaving users extremely vulnerable to malware infections ... (or worse). It's all to do with a change in the way Microsoft delivers security updates in a secure manner. Whenever Microsoft releases an update, it comes with a digital signature to prove that it came from Microsoft's servers and that the code it contains has not been tampered with. You can think of these security measures much the same way when ... (view more)

Tue
15
May
John Lister's picture

Google Drone Military Involvement Sparks Resignations

Around a dozen Google employees have resigned over the company developing artificial intelligence for use with military drones. An internal petition against the work has reportedly been signed by 4,000 employees. The protest is over Google's ... involvement in Project Maven, a program the US Department of Defense is developing to make better use of its aerial drones. It is said to collect so much video footage from its drones in war zones and other areas where the US has a military presence that it's not viable to have humans analyze all the material. The idea of Project Maven is to use computers ... (view more)

Tue
03
Apr
John Lister's picture

Google Cracks Down On Cryptomining Scams

Google is banning Chrome browser tools that harness a computer's power to 'mine' virtual online currencies for a third party. It seems Google gave up trying to distinguish between different levels of legitimacy in such set-ups. The whole concept of ... "cryptomining" using a web browser may seem baffling to many users. In the simplest terms, the cryptomining program could automatically load when visiting a particular web page or would always remain active (if it was through a browser extension). The users' computer would then "mine" (using mathematical equations) until a ... (view more)

Wed
21
Feb
John Lister's picture

Microsoft Details Anti-Malware Cloud-Based System

Microsoft says it used artificial intelligence to not only spot and identify and attempted malware attack, but to block it more than a thousand times in the next half hour. It says the defense was possible thanks to Windows Defender being used ... locally on the victim's computer, as well analyzing the snippet of code using cloud-based antimalware. The company calls it an example of machine learning. This means computers are able to figure things out for themselves, rather than simply following 'true or false' routines that are part of a program. Similar to antivirus, the most basic level of anti ... (view more)

Thu
15
Feb
John Lister's picture

Thousands of Sites Hit By 'Cryptojacking' Scam

Visitors to more than 5,000 websites had their computers hijacked to earn money for scammers. But the attack would have earned them less than $25 - and they aren't getting paid anyway. The attack involved compromising screen reader software called ... BrowseAloud. Websites can add the software to their site to make it easier for visitors with vision problems to browse the pages. Because the software is so widely used, compromising it was an effective way to reach a large number of computers - regardless of whether the owners needed to use a screen reader. The software is particularly popular ... (view more)

Pages

Subscribe to RSS - computers