Support for Ukraine



Blog Archive Search Results

You searched for Microsoft

49 result(s) found!



A Serious Security Risk: Three Zero-Day Vulnerabilities

Full Story Blog Post Friday, February 17, 2023 in Security   View No Comments No Comments
Security
Microsoft released security updates for all client and server versions of Windows that it supports yesterday. Among the 30 or so security issues that each version of Windows is affected by are three zero-day vulnerabilities that are exploited already.

It is interesting to note that all three of the zero-day vulnerabilities have received a severity rating of important. Each version of Windows is also affected by critical vulnerabilities, but none of these critical issues seem to be exploited currently.


www.ghacks.net



Rumor: Microsoft plans to release new major Windows versions every three years

Full Story Blog Post Saturday, July 16, 2022 in Windows   View No Comments No Comments
Windows

The following information needs to be taken with a grain of salt, as it has not been confirmed by Microsoft at this point.


Microsoft-Windows-11.jpg" alt="NAME" style="width:490px;height:350px; float:center; margin: 10px 15px 15px 0px;">

According to Windows Central, Microsoft plans to move from the current one-feature-update-per-year release cycle to a once-every-three-years release cycle. While that may look like a step back at first glance, Microsoft plans to release frequent feature updates, which add new features to supported versions of Windows several times per year.

The plan looks like a full reversal by Microsoft in regards to release cycles. Windows 10 was released three years after Windows 8, and Windows 8 three years after Windows 7. Not all classic versions of Windows were released three years after the previous version though, as Windows 7 was released just two years after Windows Vista, but there were always years between new major version releases.

The introduction of Windows 10 changed releases significantly. Microsoft moved to a faster release cycle and released two feature updates per year for some time; this changed with the release of Windows 11 and the moving to the current one feature update per year cycle.

If the rumors are true, Microsoft could change the release cycle again to three years. The next major release for Windows 11 is expected in 2024 under the new release schedule. Windows 11 users will receive feature drop updates regularly, starting in 2023 according to Windows Central.

Windows Central believes that Microsoft could release new features to the existing operating system up to four times per year.

Like the Taskbar Weather Icon, which Microsoft rolled out to Windows installations directly and not as part of a major feature update, these updates will land on user systems after they have gone through rounds of testing on Insider machines.

Microsoft could round up several of the features and include them in updates in Windows systems. One of the main benefits of the new approach is that administrators do not have to upgrade to major versions of Windows once or even twice per year anymore. Administrators would install new major upgrades every three years, which would take a lot of weight from their shoulders.

Users benefit from the decision as well, as new features may be included faster into Windows. Under the current release cycle system, development teams had to wait until Fall before new features and improvements would be released to stable versions of the operating system.

Microsoft-plans-to-release-new-major-windows-versions-every-three-years/" TITLE="ghacks.net" alt="ghacks.net">ghacks.net



Microsoft Edge is getting a built-in VPN powered by Cloudflare

Full Story Blog Post Friday, April 29, 2022 in Windows   View No Comments No Comments
Windows

"NAME"

Microsoft is testing a VPN-like service for its Edge browser, adding a new layer of security and privacy to the browsing experience. A recently-discovered support page on Microsoft`s website details the "Microsoft Edge Secure Network feature, which provides data encryption and prevents online tracking, courtesy of Cloudflare.

While it isn`t available yet, even if you have the latest Dev channel build, the Microsoft Edge Secure Network feature appears to be similar in nature to Cloudflare`s 1.1.1.1 service. This is essentially a proxy or VPN service, which encrypts your browsing data so that it`s safe from prying eyes, including your ISP. It also keeps your location private, so you can use it to access geo-restricted websites, or content that`s blocked in your country.

Microsoft Edge`s Secure Network mode will require you to be signed into your Microsoft account, and that`s because the browser keeps track of how much data you`ve used in this mode. You get 1GB of free data per month, and that`s tied to your Microsoft account. Most VPN services aren`t free, so this shouldn`t come as a surprise. Cloudflare itself doesn`t keep any personally-identifiable user data, and any data related to browsing sessions is deleted every 25 hours. Information related to your data usage is also deleted at the end of each monthly period.

Microsoft-Edge-VPN-data-allowance.jpg" alt="NAME" style="width:490px;height:350px; float:center; margin: 10px 15px 15px 0px;">

The support page goes into all the details of the service, including how to enable it, which suggests that it should be available in the near future. Most likely, users running Dev or Canary versions of the browser will get access to it first, with Beta and stable channel users following suit. Once it does roll out, Secure Network mode will be readily accessible from the three-dot menu in the top-right corner.

Microsoft Edge isn`t the first browser to offer some kind of VPN service. Opera has included a free VPN for a while now, and Mozilla launched a paid VPN service back in 2020. If you want to be one of the first to try it out, you might want to consider downloading one of the Microsoftedgeinsider.com/en-us/download">Microsoft Edge Insider channels, though we still don`t know when you can expect it to be available.

Microsoft-edge-built-in-vpn-powered-cloudflare/" TITLE="XDA" alt="XDA">XDA



Linux developers patch security holes faster, study shows

Full Story Blog Post Sunday, February 20, 2022 in Computer   View No Comments No Comments
Computer
There's a lot of FUD about how Linux is being shown recently to be less secure than proprietary systems. That's nonsense. But, now there are hard facts from Google's Project Zero, Google's security research team, showing Linux's developers do a faster job of fixing security bugs than anyone else, including Google.

Project Zero looked at fixed bugs that had been reported between January 2019 and December 2021. The researchers found that open-source programmers fixed Linux issues in an average of only 25 days. In addition, Linux's developers have been improving their speed in patching security holes from 32 days in 2019 to just 15 in 2021.

Its competition didn't do nearly as well. For instance, Apple, 69 days; Google, 44 days; and Mozilla, 46 days. Coming in at the bottom was Microsoft, 83 days, and Oracle, albeit with only a handful of security problems, with 109 days. By Project Zero's count, others, which included primarily open-source organizations and companies such as Apache, Canonical, Github, and Kubernetes, came in with a respectable 44 days.

Generally, everyone's getting faster at fixing security bugs. In 2021, vendors took an average of 52 days to fix reported security vulnerabilities. Only three years ago the average was 80 days. In particular, the Project Zero crew noted that Microsoft, Apple, and Linux all significantly reduced their time to fix over the last two years.

As for mobile operating systems, Apple iOS with an average of 70 days is a nose better than Android with its 72 days. On the other hand, iOS had far more bugs, 72, than Android with its 10 problems.

Browsers problems are also being fixed at a faster pace. Chrome fixed its 40 problems with an average of just under 30 days. Mozilla Firefox, with a mere 8 security holes, patched them in an average of 37.8 days. Webkit, Apple's web browser engine, which is primarily used by Safari, has a much poorer track record. Webkit's programmers take an average of over 72 days to fix bugs.

zdnet.com



The Log4j security flaw could impact the entire internet

Full Story Blog Post Thursday, December 16, 2021 in Security   View No Comments No Comments
Security

NAME

(CNN) -- A critical flaw in widely used software has cybersecurity experts raising alarms and big companies racing to fix the issue.

The vulnerability, which was reported late last week, is in Java-based software known as "Log4j" that large organizations use to configure their applications -- and it poses potential risks for much of the internet.

Apple's cloud computing service, security firm Cloudflare, and one of the world's most popular video games, Minecraft, are among the many services that run Log4j, according to security researchers.

Jen Easterly, head of the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA), called it "one of the most serious flaws" seen in her career. In a statement on Saturday, Easterly said "a growing set" of hackers are actively attempting to exploit the vulnerability.

As of Tuesday, more than 100 hacking attempts were occurring per minute, according to data this week from cybersecurity firm Check Point.

"It will take years to address this while attackers will be looking... on a daily basis [to exploit it]," said David Kennedy, CEO of cybersecurity firm TrustedSec. "This is a ticking time bomb for companies."

Here's what you should know:

What is Log4j and why does it matter?

Log4j is one of the most popular logging libraries used online, according to cybersecurity experts. Log4j gives software developers a way to build a record of activity to be used for a variety of purposes, such as troubleshooting, auditing and data tracking. Because it is both open-source and free, the library essentially touches every part of the internet.

"It's ubiquitous. Even if you're a developer who doesn't use Log4j directly, you might still be running the vulnerable code because one of the open source libraries you use depends on Log4j," Chris Eng, chief research officer at cybersecurity firm Veracode, told CNN Business. "This is the nature of software: It's turtles all the way down."

Companies such as Apple, IBM, Oracle, Cisco, Google and Amazon, all run the software. It could present in popular apps and websites, and hundreds of millions of devices around the world that access these services could be exposed to the vulnerability.

Are hackers exploiting it?

Attackers appear to have had more than a week's head start on exploiting the software flaw before it was publicly disclosed, according to cybersecurity firm Cloudflare. Now,with such a high number of hacking attempts happening each day, some worry the worst is to yet come.

"Sophisticated, more senior threat actors will figure out a way to really weaponize the vulnerability to get the biggest gain," Mark Ostrowski, Check Point's head of engineering, said Tuesday.

Late Tuesday, Microsoft said in an update to a blog post that state-backed hackers from China, Iran, North Korea and Turkey have tried to exploit the Log4j flaw.

Why is this security flaw so bad?

Experts are especially concerned about the vulnerability because hackers can gain easy access to a company's computer server, giving them entry into other parts of a network. It's also very hard to find the vulnerability or see ifa system has already been compromised, according to Kennedy.

In addition, a second vulnerability in Log4j's system was found late Tuesday. Apache Software Foundation, a nonprofit that developed Log4j and other open source software,has released a security fix for organizations to apply.

How are companies are trying to address the issue?

Last week, Minecraft published a blog post announcing a vulnerability was discovered in a version of its game -- and quickly issued a fix. Other companies have taken similar steps.

IBM, Oracle, AWS and Cloudflare have all issued advisories to customers, with some pushing security updates or outlining their plans for possible patches.

"This is such a severe bug, but it's not like you can hit a button to patch it like a traditional major vulnerability. It's going to require a lot of time and effort," said Kennedy.

For transparency and to help cut down on misinformation, CISA said it would set up a public website with updates on what software products were affected by the vulnerability and how hackers exploited them.

What can you do to protect yourself?

The pressure is largely on companies to act. For now, people should make sure to update devices, software and apps when companies give prompts in the coming days and weeks.

cp24.com

Prev 1 2 3 4 5 6 7 8 9 10 Next

?>