Tech

“Expert” hackers used 11 zerodays to infect Windows, iOS, and Android users

Enlarge (credit: Getty Images) A team of advanced hackers exploited no fewer than 11 zeroday vulnerabilities in a nine-month campaign that used compromised websites to infect fully patched devices running Windows, iOS, and Android, a Google researcher said. Using novel exploitation and obfuscation techniques, a mastery of a wide range of vulnerability types, and a […]

Tech

The world’s second-most popular desktop operating system isn’t macOS anymore

Enlarge / Just a few of the Chromebooks we’ve reviewed and tested in recent years. (credit: Valentina Palladino) For ages now, every annual report on desktop operating system market share has had the same top two contenders: Microsoft’s Windows in a commanding lead at number one, and Apple’s macOS in distant second place. But in […]

Tech

Zerodays under active exploit are keeping Windows users busy

Enlarge (credit: Getty Images) It’s the second Tuesday of February, and that means Microsoft and other software makers are releasing dozens of updates to fix security vulnerabilities. Topping of this month’s list are two zerodays under active exploit and critical networking flaws that allow attackers to remotely execute malicious code or shut down computers. The […]

Tech

Microsoft earnings: Xbox hardware sales shot up 86% with Series X/S

Enlarge / The Xbox Series X, which launched in November. (credit: Sam Machkovech) Microsoft delivered its earnings report for Q2 2021 yesterday, and the company has continued its sprint of very strong quarters, again driven primarily by Azure and the cloud. But that same old story isn’t the only one here: the report also tells […]

Tech

Hackers used 4 zero-days to infect Windows and Android devices

Enlarge (credit: Getty Images) Google researchers have detailed a sophisticated hacking operation that exploited vulnerabilities in Chrome and Windows to install malware on Android and Windows devices. Some of the exploits were zero-days, meaning they targeted vulnerabilities that at the time were unknown to Google, Microsoft, and most outside researchers (both companies have since patched […]

Tech

Microsoft hints at coming “sweeping visual rejuvenation” of Windows 10

Enlarge / This screenshot of the Photos and Calculator apps comes from a video Microsoft product chief Panos Panay dropped on Instagram to demonstrate new UI concepts in March 2020. (credit: Microsoft) We’ve been hearing rumors for a while now about a significant visual refresh planned for Windows 10 in 2021 under the codename “Sun […]

Tech

Microsoft Might be Creating its Very Own, in-house ARM CPU Layouts

Expand / Microsoft has thus much neither confirmed nor denied Bloomberg’s claims concerning in-house CPU layouts. (charge: Aurich Lawson / / Grid Engine) This day, Mr reported which Microsoft is in the process of creating its ARM CPU layouts, following in the footsteps of Apple’s M1 cellular CPU along with Amazon’s Graviton datacenter CPU. Bloomberg cites […]

Tech

Xbox Cloud Gambling Support Strikes iOS, Windows PCs in spring 2021 

Expand / This demo of Microsoft’s Job xCloud as played a Razer Kishi controller, attached to your normal Android smartphone, may be a sign of what is to come to iOS apparatus in spring of 2021. At a blog article now retrieved everything from forthcoming games to programs for Xbox collection X/S, Microsoft announced that […]

Tech

Google’s Job Zero Reveals Windows 0day that Has been under active Harness

Expand (charge: Getty Images) Google’s job zero claims that hackers are actively exploiting a Windows zeroday which is not very likely to be patched before nearly a couple of months away from now. In keeping {} , Google’s exposure study team gave Microsoft a seven-day deadline to repair the security flaw as it is under […]

Tech

FBI/DHS: Government election Methods face Danger from Busy Zerologon exploits

Expand (credit: Getty Images) Even the FBI and the cybersecurity arm at the Department of Homeland Security said they’ve discovered hackers harnessing a critical Windows vulnerability against local and state authorities and in some circumstances the attacks have been used to breach networks utilized to encourage elections. Participants of unspecific APTs–that the abbreviation for complex […]