New threads

This page contains the latest threads that were created in our community.

Opera Browser adds support for video call popouts and Pinboards

Opera Software released a new version of its Opera web browser for the desktop today. Opera G5, that is the codename of the browser, introduces support for video call popouts and the new Pinboards feature.

Usage of video calls has risen in the past year as many workers from all over the world started to work partially or fully from home. Opera Software found out that 57% of its users have joined video calls in "recent months".

Video calls happen in browser tabs, if the browser is used to join the call. While some users use the browser window exclusively for the call, others work on different tasks, e.g. switching to other tabs for searches or opening websites, or switching programs.

One issue that comes out of the multi-tasking is that it may sometimes be difficult to relocate the video call tab in the web browser.

Opera's popout feature for video calls provides a solution. It works similarly to picture-in-picture mode that many browsers have introduced in recent time to play video content in a popout. The main idea behind these features is to keep the media always in sight while using the browser for other tasks.

Opera's solution is compatible with Microsoft Teams, Google Meet and Zoom. The video conferencing popout moves the video call into a floating window and keeps it on top of other tabs this way.

The feature is automatic, meaning that video calls will pop out whenever users switch to another tab while a video call is happening in the browser. Switching back to the tab of the video call will "pop-in" the widget again on the page, also automatically.

Opera users may configure the behavior in the preferences of the browser.

The behavior can be adjusted in settings. This makes multitasking easier, so you can stop juggling tabs during calls. There’s also a clever option to make the floating window transparent giving users both more screen and constant contact with people on the call.
opera videoconferencing popout


The preferences list three options related to the new video call popout feature of the browser. You may toggle it on or off, toggle the automatic detaching of video calls from the tab when switching tabs, and toggle the transparent feature, which makes the pop out transparent.

Pinboards​

opera pinboards


The second feature addition in the new Opera browser is Pinboards. As the name suggests, it enables you to create collections of links, images and texts in the browser.

A click on the pinboard icon in the main toolbar displays options to start a new pinboard or add the current link to an existing pinboard. The management interface lists all elements that you have added to the active pinboard. You may add links and images from the local system manually, and add headlines and text.

Pinboards can be shared -- they use the address View this pinboard followed by a unique identifier. The local view uses a different unique identifier than the public view on Opera's website, it is unclear if all pinboards are public by default and only obfuscated by the unique ID, or if they become public only after the pinboard creator hits the share button in the Opera browser. The public pinboard page loads in every modern web browser, and viewers may access the content and react to it with emojis.

Opera Software highlights several use scenarios, from article collections and trip preparations to shopping wishlists and home decoration idea collections.

Opera users who don't need to the feature can turn if off in the browser settings.

Music player improvements​

opera browser music


The third and final improvement in Opera G5 adds support for more music services to the sidebar music player. Besides support for Apple Music, Spotify and YouTube Music, Opera supports Deezer, Tidal, SoundCloud and Gaana now as well.

New controls become visible on hover over the player icon in the sidebar. These allow users to control playback using a "mini control popup" without having to open the entire interface.

French court to hear App Store complaint in September

A French court has set a date to hear a case brought against Apple by the country's finance ministry over allegedly abusive contract terms on the App Store.

The case will be heard by a Paris commercial court on Sept. 17, 2021, Reuters reported Wednesday. Although it's unlikely to result in significant fines, the court could force Apple to change some of its contractual terms in the country.

In France, local law allows the country's finance minister to sue companies if abusive business practices are found in contracts. The complaint was levied against Apple following a three-year probe by France's CGCCRF consumer fraud watchdog.

France's finance minister, Bruno Le Maire, last year accused Apple of being part of a small group of tech giants that are"reaping most of the profits" in the country.

SonicWall Left a VPN Flaw Partially Unpatched Amidst 0-Day Attacks

A critical vulnerability in SonicWall VPN appliances that was believed to have been patched last year has been now found to be "botched," with the company leaving a memory leak flaw unaddressed, until now, that could permit a remote attacker to gain access to sensitive information.

The shortcoming was rectified in an update rolled out to SonicOS on June 22.

Tracked as CVE-2021-20019 (CVSS score: 5.3), the vulnerability is the consequence of a memory leak when sending a specially-crafted unauthenticated HTTP request, culminating in information disclosure.

It's worth noting that SonicWall's decision to hold back the patch comes amid multiple zero-day disclosures affecting its remote access VPN and email security products that have been exploited in a series of in-the-wild attacks to deploy backdoors and a new strain of ransomware called FIVEHANDS.

Howevere, there is no evidence that the flaw is being exploited in the wild.

Hello there

I joined recently, I am Russ2009, I am a researcher of malware. Including Rogue Software, adware, PUPs, Ransomware, Trojans, Viewer Made Malware (Including those made by Leurak), etc.

Microsoft begins autoupdating more devices to Windows 10 21H1

Microsoft has announced that they have started auto-upgrading a larger number of Windows 10 devices nearing end of life to Windows 10 21H1.

Earlier this month, Microsoft began training their machine learning algorithms by automatically upgrading a small amount of Windows 10 2004 users to Windows 10 21H1.

Microsoft did this training to discover issues that may arise during the update process before upgrading a larger population of Windows 10 users.

For most people, Windows 10 21H1 is still being offered as an optional update displayed when manually performing a 'Check for updates' in Windows Update.

The rest

Norton Security Premium for 3 months free comss.ru

Get a free 3 months (90 days) Norton Security Premium license. Protect up to 10 of your devices, including Windows computers, Mac and Android mobile devices, iPhone and iPad

Norton Security is a comprehensive antivirus, a new solution for comprehensive Internet protection of your computer, important data and online activity. Multi-layered security system to block all types of threats.

1624482978142.png



Norton Security Premium 3 months free​

To get a free 90-day 10-device Norton Security license, follow these steps:

1. Download the comprehensive antivirus from the following link, choosing Norton Security for 3 months free on the download page and install it on your computer:

Download Norton Security:Скачать Norton Security Premium на 3 месяца бесплатно. Защита для 10 устройств

The distribution kit for activating the license is available in English

Supported Operating Systems Windows 10 / 8.1 / 8/7 32 | 64-bit.

2. Create a new account in the Create an account menu and confirm the specified email address.
3. After installing and creating an account, download the latest version by selecting " Norton Security Premium to update , and install over. After rebooting the system, log in to your account.
4. You will receive a free 3-month Norton Security Premium license that can be installed on 10 devices - Windows and Mac computers, Android mobile devices, iPhone and iPad. To install on other devices, use your account information and the my.norton.com portal .

AOMEI Partition Assistant Pro - Free License

AOMEI Partition Assistant Pro allows you to create, delete, resize, format hard disk partitions, merge, split and move (or copy) them, including to another hard disk or SSD.

The application provides users with a step-by-step interface for performing basic steps related to managing hard disk partitions. With step-by-step actions, you can quickly get the job done without losing data.

Supports all storage devices such as: flash drives, HDDs, SSDs, RAID arrays with both MBR and GPT disk partition styles.



Main features of AOMEI Partition Assistant Pro​

  • Migrating OS to SSD / HDD: For many SSD users, this simple technology can help migrate their OS to SSD and keep the original system.
  • Partition Recovery: Recover lost or deleted partitions in a few steps.
  • Partition alignment: speed up the performance of disks when reading and writing data, especially SSD disks.
  • Bootable CD Creation: Safely manage disk partitions in WinPE mode and boot from CD / DVD, USB flash memory.
  • Overwrite MBR: Overwrite from the master boot disk to a corrupted MBR hard disk for easy recovery.
  • Convert Between GPT and MBR: Convert from GPT disk to MBR without data loss and vice versa.
  • Linux partitions management: create, delete, format, copy, destroy, restore Ext2 / Ext3 partitions.
  • Changing the type of partitions (ID) and changing the serial number.
  • Create dynamic disk partitions: Install mirrored volumes on Windows for error resilience.
  • Removing and formatting partitions with FAT or NTFS file systems.
  • Resize and relocate dynamic disks without losing data.
  • Shrink dynamic partitions to maximize disk space.
  • Expanding dynamic system / download size for optimal computer performance.
1624482345790.png

John McAfee found dead in Barcelona prison, authorities say

John McAfee, founder of the company behind McAfee Antivirus, has been found dead according to reports from Reuters, El Mundo, and El País. He was being held in a Barcelona prison, and the Catalan Department of Justice has stated that his death was likely caused by suicide. McAfee’s lawyer confirmed his death to Reuters, saying that it was “the result of a cruel system that had no reason to keep this man in jail for so long.”

McAfee was being held in prison, pending extradition to the US, after being arrested in October 2020. He faced charges of tax evasion and had also been charged with securities fraud relating to an alleged cryptocurrency pump and dump scheme. Spanish courts had approved his extradition this morning with opportunity for appeal, according to Reuters and El Mundo.

McAfee has a history of run-ins with law enforcement. He, his family, and members of his security forces were arrested by the Belize police in 2012, after drug and firearm charges. He went on the run later that year, after the Belize police declared that he was wanted for questioning in relation to the murder of his neighbor.

Microsoft Store is crashing worldwide on Windows 10 PCs

Windows 10 users are currently experiencing issues with the Microsoft Store, with the app unable to download and install apps and crashing after repeated attempts.

When attempting to download apps from the Microsoft Store, users are seeing a loading or frozen page. Specifically, nothing happens when users click on the "Get" button to download apps or games.

When attempting to access various Microsoft Store features, such as the downloads section, the program will sit at a screen with a spinning loading symbol.
microsoft-store-crashing.gif

Microsoft Store loading forever
This is a developing story and will be updated as more information becomes available.

Microsoft says don't trust phony call centers and malicious Excel files

What you need to know
  • Microsoft Security Intelligence has caught wind of a new ransomware attack strategy.
  • It involves fake call centers and malicious Excel files.
  • The campaign is dubbed "BazaCall."
There's a ransomware campaign going on called BazaCall. It's been circulating for months, but Microsoft Security Intelligence is now publicizing its major points on Twitter with screenshots to help inform the average person of how to stay safe (via ZDNet).

Here's how BazaCall works. First, you'll receive an email saying a subscription service of yours is up for renewal, and you'll be invited to call a phone number to cancel if you wish.

When you call, you'll be told to go to a website and download an Excel file. That file contains the macro that gets the payload onto your machine, crippling you with ransomware.

It sounds like a dumb plot on paper, but in reality, decently written emails and full-on fake call centers can present the appearance of a legitimate operation to the gullible, uninformed, or inattentive. As Microsoft mentions in its tweet thread discussing BazaCall, the threat is made even more complex by the fact that there's nothing overtly malicious in the emails themselves, making danger harder to detect.

The name BazaCall stems from the malware the campaign distributed in the beginning: BazaLoader. Though it's been kicking around for a bit, it seems the efforts to spread ransomware are amping up as people get wise to classic tricks.

Today we're dealing with harmless emails, con-job call centers, and dangerous Excel files. What happens tomorrow? Do fraudsters legally register and operate entirely legitimate businesses solely to have addresses and phone numbers for swindles on the side? Aside from the fact that that already happens, the point is that ransomware may seem like a foreign concern at the moment, but be ready: Cybercriminals are working overtime to drag you into their net, no matter how elaborate of a scheme such a victory requires.

AMD ends graphics driver support for Windows 7 and Windows 8.1

AMD released a new version of its Radeon Software Adrenalin driver this week. Radeon Software Adrenalin 21.6.1 is the first driver of the series that supports Microsoft's Windows 10 operating system only, but not the earlier versions of Windows, Windows 7 and Windows 8.1.

The driver adds support for AMD Radeon RX 6800M Graphics and the new game Dungeons & Dragons: Dark Alliance. It also fixes several issues, including crashes and freezes.

The release notes provide the following information in regards to support for older versions of the Windows operating system:

Support for Windows® 7 based operating systems and some older generations of AMD Radeon™ Graphics products have been moved to a legacy support model.
The linked support article on AMD's Community website lists affected graphics products by the company. The final driver that supports Windows 7 and Windows 8.1 is Radeon Software Adrenalin 21.5.2. No driver updates will be released for the operating systems and development focus will be on developing drivers for Microsoft's Windows 10 operating system only going forward.

What end of support means for affected systems..............​

Read the full article here

Tencent has bought a majority stake in German developer Yager

In an interview with the German website GamesWirtschaft.de, it’s been revealed that Tencent has purchased a majority stake in the developers responsible for Spec Ops: The Line.

This move continues on from Tencent’s acquisition of a minority stake back in early 2020, with Yager saying that those funds would be put towards the development of their free to play title, The Cycle, as well as future projects.

Since developing the cult classic Spec Ops: The Line, and having a turn at making Dead Island 2 work, Yager have turned their attentions towards The Cycle, which is being relaunched after being changed through community early access feedback.

It’s unclear just what this majority acquisition by Tencent might mean for the future of Yager, but hopefully, with renewed investment, and the tweaks that have been made, The Cycle may end up being a great game that’s well worth your time and this investment.

This isn’t the first studio that Tencent has made key investments in as the Chianese conglomerate has made significant investments in companies such as Epic Games, Ubisoft and Remedy, to Roblox, and Bohemia Interactive.

You may replace Windows Search with EverythingToolbar now

replace-start-menu-search.png


The latest beta of the Windows search tool Everything Toolbar supports replacing Windows Search with Everything Search.

Everything Search is a popular third-party search tool for Windows devices that comes with everything that you might want in a search tool. It is very fast, supports fast sorting, content searches, previews, thumbnails, and a lot more.

Everything Toolbar is a third-party project that uses Everything but adds its own toolbar search option to Windows. You get Everything, but with a toolbar search option added to the experience.

The latest beta version of EverythingToolbar, version 0.7.0 beta 1, includes an experimental option to remap the Start menu search option to Everything. Considering that you get two experimental features, the build and the remapping of the Windows Start Menu search, it is clear that this is not ready yet for use in production environments. Everything worked fine during tests though.

Full article

Microsoft Outlook extension is now available in preview for Edge

Outlook is available on multiple platforms already including the web, iOS, and Android. But today, without much fanfare, Microsoft seems to have made its new Outlook extension for Edge available for the public, albeit with a "preview" tag. The name of the extension is "Microsoft Outlook" but the "preview" iconography can be seen its store listing.

The extension, which can be downloaded from the Microsoft Edge Add-ons store here, essentially allows you to use Outlook directly in any tab of the browser without opening a new window. After you download it, an icon for Outlook will be visible on the address bar, and when you sign in, you'll be able to get a view of your emails, calendar, contacts, and tasks, among other things. The features mentioned in the store listing are as follows:
  • Access work or personal accounts
  • Read, send, and manage email and get new email notifications
  • Create events, view upcoming ones, and join online meetings
  • Create, track, and manage tasks
  • Manage contacts
It is important to note that the extension can only be downloaded on Microsoft Edge and is not compatible with other browsers like Google Chrome.

The store listing indicates that the extension was last updated on June 14, 2021, so it's currently unclear whether it has just been made available to the public or if it's only been discovered now. Given the lack of an official announcement from Microsoft as well as the fact that it doesn't pop up in search results, any possibility is equally likely. Although some users have reported they have already started seeing ads for the extension in their Outlook clients. We'll let you know when Microsoft officially announces the extension but in the meantime, you can take it for a spin on Edge here.

The source

Firefox 89.0.2 released

VLC media player 3.0.16

Wormable DarkRadiation Ransomware Targets Linux and Docker Instances

Cybersecurity researchers are sounding the alarm bell over a new ransomware strain called "DarkRadiation" that's implemented entirely in Bash and targets Linux and Docker cloud containers, while banking on messaging service Telegram for command-and-control (C2) communications.

"The ransomware is written in Bash script and targets Red Hat/CentOS and Debian Linux distributions," researchers from Trend Micro said in a report published last week. "The malware uses OpenSSL's AES algorithm with CBC mode to encrypt files in various directories. It also uses Telegram's API to send an infection status to the threat actor(s)."

As of writing, there's no information available on the delivery methods or evidence that the ransomware has been deployed in real-world attacks.

The findings come from an analysis of a collection of hacking tools hosted on the unidentified threat actor's infrastructure (IP address "185.141.25.168") in a directory called "api_attack." The toolset was first noticed by Twitter user @r3dbU7z on May 28.

DarkRadiation's infection chain involves a multi-stage attack process and is noteworthy for its extensive reliance on Bash scripts to retrieve the malware and encrypt the files as well as Telegram API to communicate with the C2 server via hardcoded API keys.

Hello

Hi everybody, I'm Joanne.
Just signed up hoping for some answers.
Nice to meet everybody.

Virus in the core

Help, I've got some virus that's stealing all my data and changing my info. I've factory restored that many times. Mm to phone won't run in safe mode either and to try and reboot it's just an android dead with an explanation mark. My phones been running really hot. Please help.

Patch Tor Browser Bug to Prevent Tracking of Your Online Activities

Open-source Tor browser has been updated to version 10.0.18 with fixes for multiple issues, including a privacy-defeating bug that could be used to uniquely fingerprint users across different browsers based on the apps installed on a computer.

In addition to updating Tor to 0.4.5.9, the browser's Android version has been upgraded to Firefox to version 89.1.1, alongside incorporating patches rolled out by Mozilla for several security vulnerabilities addressed in Firefox 89.

Chief among the rectified issues is a new fingerprinting attack that came to light last month. Dubbed scheme flooding, the vulnerability enables a malicious website to leverage information about installed apps on the system to assign users a permanent unique identifier even when they switch browsers, use incognito mode, or a VPN.

Put differently, the weakness takes advantage of custom URL schemes in apps as an attack vector, allowing a bad actor to track a device's user between different browsers, including Chrome, Firefox, Microsoft Edge, Safari, and even Tor, effectively circumventing cross-browser anonymity protections on Windows, Linux, and macOS.

Lexmark Printers Open to Arbitrary Code-Execution Zero-Day

Lexmark printers – those ubiquitous, inky office workhorses that fill homes and offices, and are found all the way on up to the federal government – have an unpatched vulnerability that could lead to serious, easy-to-execute attacks that require neither privileges nor user interaction and which can lead to arbitrary code execution.

According to an advisory filed by researcher Julio Aviña on the IBM X-Force Exchange, the flaw could lead to a low-complexity attack that could allow a local attacker to execute arbitrary code. The vulnerability’s CVSS 3.0 base score is high, at 8.4. Fortunately, it doesn’t appear to have been exploited yet: The report lists the bug’s exploitability as “unproven.”

The bug, found in the Lexmark Printer Software G2 Installation Package, is caused by an unquoted service-path vulnerability in the “LM__bdsvc” service. That package allows an administrator to customize the users’ installation experience, according to Lexmark.

The installation package in question runs on Microsoft Windows operating systems Vista (32-bit/64-bit), Server 2008 (32-bit/64-bit), Windows 7 (32-bit/64-bit), Server 2008 R2 (64-bit), Windows 8.1 (32-bit/64-bit), Windows 10 Client (32-bit/64-bit), Windows Server 2012, Server 2012 (64-bit) R2, Server 2016 (64-bit) and Server 2019 (64-bit) print and scan drivers with an enhanced GUI.

“By placing a specially crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system,” the advisory explained. According to ProcessChecker, a service that shows information about running processes, LM__bdsvc.exe is part of the printer communication system.

As of Tuesday, there was no patch or other workaround available, Aviña wrote: “No remedy available as of June 21, 2021.”

The advisory states that a successful attempt to exploit the bug requires the attacker “to insert an executable file into the service path undetected by the OS or some security application.” When the service or the system restarts, that executable will run with elevated privileges.

Lexmark told Threatpost on Tuesday that a fix is in the works. Lexmark CSO Bryan Willett said in an emailed statement that “Lexmark takes security very seriously. We are aware of this concern and are working to address the vulnerability. We welcome security researchers to report vulnerabilities directly at Lexmark Security Advisories

TTB internet security

Hi this software is sold on Amazon(Amazon canada and Amazon India ) I downloaded the program. when I scanned it in VirusTotal, 13 antivirus programs saw it as harmful. is ttb internet security malware ?

May 2021 - Advanced In The Wild Malware Test

Hello MalwareTips Members!

The May edition of our “Advanced In the Wild Malware Test” reveals a different approach to applying security to Windows 10 by developers that design protection software. In our study that is complaint with MITRE tactics and techniques, we have analyzed 11 solutions that protect endpoints. The test lasting uninterruptedly for the whole month, 24 hours a day, was possible to carry out thanks to a programmed system that performs tedious calculations and actions in the Windows system, automating the entire test procedure (aggregating and analyzing logs, giving a final verdict). The design and operation of this system are described in this article and in the methodology.

Useful links:

Google bing redirect virus

I can't seem to remove the redirect no matter which walware scanner I've used. I am trying the farbar recovery sanner tool now I need some help with it

VPNS - Logging and Everything Else

I came across this interesting article about VPN logging policies, and the real world use of a VPN as an additional security tool but not necessarily an end all or be all solution.

I have no affiliation with the website and/or writer of the article nor can I verify what he is saying as being absolutely true.

I will say that I too have seen the marketing hype by VPN services throughout the internet in regard to zero logging, no logging, and/or limited logging. It gets to be mind boggling, and very confusing.

However, I found it to be an interesting read for those who like to be well informed, and different perspectives. Imo, I would say use it as an educational guide to making an informed decision when you choose a VPN service.

NetNewsWire for iPhone and iPad adds iCloud sync, Twitter and Reddit integration, more

Homepage: https://netnewswire.com/

App Store: ‎NetNewsWire: RSS Reader

NetNewsWire is one of the most powerful RSS readers for iPhone and iPad, and it’s getting even better with a new update rolling out today. NetNewsWire 6 is now available on the App Store with new features including iCloud syncing, home screen widgets, and more.

Stuart Breckenridge, one of the developers behind NetNewsWire, detailed the update in a blog post today. iCloud syncing is a particularly notable enhancement because it lets you sync feeds across your Apple devices without relying on a third-party service of any sort:
iCloud syncing is a game-changing feature if you want to sync your feeds across your Apple devices and don’t want to use a third-party syncing service to do so.

You can enable iCloud syncing in the app by going to Settings > Add Account > iCloud. Once enabled, you can either drag feeds from your existing local account or third-party service to iCloud or add feeds directly using Add Feed and selecting the iCloud account.

From there, it behaves like a local account with one small difference: It will sync your feed subscriptions, read and starred statuses across your Apple devices. It’s a really cool feature.

NetNewsWire for iOS also now supports integration with Twitter and Reddit. This means you can see Reddit posts, Twitter mentions and searches, and more, directly in the NetNewsWire application.

Finally, NetNewsWire for iOS also now supports home screen widgets:
There are three variations of home screen widgets that follow your Smart Feeds: a Today widget, an Unread widget, and a Starred widget. They come in medium and large sizes. Tapping on articles will take you straight to the article while tapping anywhere else will open the app.
NetNewsWire is one of the best and most powerful RSS readers for iPhone, iPad, and Mac. it’s completely free and open-source, and you can download it on the App Store.

The source

Patch D for KAVKISKTSKFA 2021 MR3 / KS / VPN / KSOS beta

Hi,
Patch is available for testing now.

Update sources: Index of /ap2/

Please note that to install the patch in KSeC (KSDE), you need to update the product from the test server using the commands below.
Code:
Windows x86cd "%ProgramFiles%\Kaspersky Lab\Kaspersky Secure Connection 5.2"avp.com update http://dnl-test.kaspersky-labs.com/ap2

Windows x64cd "%ProgramFiles(x86)%\Kaspersky Lab\Kaspersky Secure Connection 5.2"avp.com update http://dnl-test.kaspersky-labs.com/ap2
Check the presence of a patch in the standard windows "Support", "About the program."

Changes:
WebAV performance tuning

To begin testing you need to do next:
1. Install product
2. Update from public servers and reboot OS
3. Enable traces
4. Set Manual mode of Update
5. Set Update source: Index of /ap2/
6. Reboot OS

As usual I'd like to remind you:
1) If you found any problem, please, re-check it on the previous patch. Here we are looking only for bugs related to current patch.
2) Don't forget about traces and screenshots.

Bug report: version 2021MR3
Flood will be deleted.
Source

Which is better Chromium or Ungoogled Chromium?

Right now I am using Eloston Ungoogled Chromium. Runs smooth and fast. However, it is one version behind the latest update.

I always avoided Chromium because I thought it was a beta version before Google stabilized it. I think I may be wrong, so clarification would be helpful.

If one had a choice of the two, which one would you use, and why?

Foxconn Offers 'Record-High' Bonuses to Recruit Workers for iPhone 13 Assembly

Apple's largest manufacturing partner Foxconn is offering "record-high" signing bonuses in an effort to recruit workers for iPhone 13 production over the next few months, according to the South China Morning Post.

The report claims Foxconn is offering up to 8,000 yuan ($1,235) as a signing bonus to former workers willing to return to its Zhengzhou, China factory to assist with iPhone assembly during the "peak season," up from 5,500 yuan last month and 5,000 yuan in 2020. Workers will receive their bonuses after working for Foxconn's iPhone assembly division for four months and staying until the end of the peak season, the report adds.

The rest

Samsung won't buy OLEDs from LG because its QLEDs are already better, says Samsung

Samsung today has denied the rumors of its OLED purchase deal with LG that have been circulating around the web over the last few months. In a phone call with a Korean digital publication IT Chosun, an official from Samsung Electronics' visual display (VD) business division has stated that the rumors are groundless and also went further to say that such a deal wouldn't be fruitful for Samsung as its in-house QLED TVs already produce better pictures than LG's OLEDs.

Back in April, the rumor regarding this procurement deal broke out which said that Samsung was looking to buy OLEDs from LG to cope with the rising LCD panel prices in China. The rising prices were a result of the COVID-19 pandemic that hit the world hard across all sectors, and the technology sector has been no exception. However, it was already stated in that report too that no contracts were signed and the deal wasn't past the negotiating phase.

Interestingly, IT Chosun had on the same day, in an interview, asked Samsung President Jong-Hee Han about the OLED procurement deal to which Han said responded negatively stating that there was no intention of such a deal at all. He again reiterated it when the publication met President Han at the World IT Show (WIS) 2021. Despite all this, the rumor mill had clearly not stopped spinning, and it would be interesting to see if it halts now.

I've tried everything, but Searchmarquis.com still there

hi
I have run through the many steps as suggested over and over again: ,
but my computer still have Searchmarquis.com browser hijacker
Do you have any suggestions?
thank you.

Google Chrome on iOS is getting an enhanced privacy feature

Google Chrome for iOS now allows you to lock your incognito tabs behind Face ID so other people can't snoop on what sites you are visiting.

Google Chrome's incognito mode is commonly used to visit sensitive sites that people do not want to appear in the browser history or for cookies to be saved.

If a user leaves their phone unlocked, nothing prevents another person from viewing what tabs are currently open in Incognito mode.

Google Chrome for iOS now includes an additional experimental privacy feature that allows you to lock Incognito mode behind your iPhone's Face ID authentication feature so that only you can access the open tabs.

Once enabled, when attempting to open the secured Incognito tabs in Chrome for iOS, the browser will prompt the person to authenticate using Face ID, as shown below.

Chrome Incognito tabs locked behind Face ID

Chrome Incognito tabs locked behind Face ID
Once Incognito mode has been unlocked with Face ID, you will not have to unlock it again until you close and open the browser again.

As Google is still testing this feature, you have to enable it via the chrome://flags page using the following steps:
  1. Open Chrome and enter chrome://flags in the address bar, and press Go on the virtual keyboard.
  2. When the Chrome 'Experiments' page opens, search for 'Device Authentication for Incognito' and enabled it.

    Enabling experimental feature

    Enabling experimental feature

  3. Now close and reopen the Chrome browser.
  4. When Chrome is started again, go into Settings > Privacy and enable the 'Lock Incognito Tabs when you close Chrome' setting as shown below.

    Chrome for iOS Privacy settings

    Chrome for iOS Privacy settings
Now that the feature is enabled, every time you try to access your Chrome Incognito tabs, it will prompt you to unlock them with Face ID.

To disable this feature, simply toggle off the 'Lock Incognito Tabs WhenYou Close Chrome' in the settings.

Bugs in NVIDIA’s Jetson Chipset Opens Door to DoS Attacks, Data Theft

Flaws impacting millions of internet of things (IoT) devices running NVIDIA’s Jetson chips open the door for a variety of hacks, including denial-of-service (DoS) attacks or the siphoning of data.

NVIDIA released patches addressing nine high-severity vulnerabilities including eight additional bugs of less severity. The patches fix a wide swath of NVIDIA’s chipsets typically used for embedded computing systems, machine-learning applications and autonomous devices such as robots and drones.

Impacted products include Jetson chipset series; AGX Xavier, Xavier NX/TX1, Jetson TX2 (including Jetson TX2 NX), and Jetson Nano devices (including Jetson Nano 2GB) found in the NVIDIA JetPack software developers kit. The patches were delivered as part of NVIDIA’s June security bulletin, released Friday.

Malwarebytes 4.4.0.222

What is new in this version:
  • Enhanced Support for Edge Browsers
  • Teams Banner for Trials
  • Enhanced Hardening against False Positives
  • Enhanced detection and remediation

Some Issues now addressed:
  • Fixed: Update available notification does not display when auto updates is turned off
  • Fixed: Switching between settings tabs shows incorrect behaviour
  • Fixed: Malwarebytes web protection slowing down PC (CU: 1.0.1292)
  • Fixed: Cannot change password for user access if password is too long
  • Fixed: MWAC is not handling IP address exclusions specified as an IP Integer value
  • Fixed: Check for updates is not disabled in jump list menu while scan is in progress
  • Fixed: Delay RTP when Malwarebytes starts seconds does not honor restore defaults
Several UI Issues:
  • Fixed: The Upgrade button on the RTP card navigates the user to a wrong place
  • Fixed: Password length restriction not visibly enforced
  • Fixed: Accessibility - Settings Tabs do not have focus rectangles when using keyboard navigation
  • Fixed: Restore Default settings doesn't work on Delay RTP when MB starts dropdown
  • Fixed: German. Start date and Start Time settings drop-downs are too small. Text is not visible at all
  • Fixed: Quarantined items in Detection History should be in chronological descending order
  • Fixed: Error modal typo: “Please check your internet connetion…”
  • Fixed: Incorrect Swedish translations
  • Fixed: The configure custom scan window (text and drop down menu border) does not render correctly on Russian OS
  • Fixed: Sign in: Forgot password requirements "e.g." instead of "ex"
  • Fixed: Drop down menu wheel not always visible
  • Fixed: Advanced Scanners page (Scan Start > Advanced Scanners) Button: Configure Scan should be Configure scan
  • Fixed: Settings\Notifications: Needs copy updates

Homepage

Download offline link

Malicious PyPI packages hijack dev devices to mine cryptocurrency

This week, multiple malicious packages were caught in the PyPI repository for Python projects that turned developers' workstations into cryptomining machines.
All malicious packages were published by the same account and tricked developers into downloading them thousands of times by using misspelled names of legitimate Python projects.

Radeon Software Adrenalin 21.6.1 released

Support For​

  • AMD Radeon™ RX 6800M Graphics
  • Dungeons & Dragons: Dark Alliance™
  • AMD FidelityFX Super Resolution (FSR) support for select titles.
    • Learn more from AMD here.

Fixed Issues​

  • Radeon FreeSync™ may intermittently become locked while on desktop after performing task switching between extended and primary displays upon closing a game, causing poor performance or stuttering.
  • Anno 1800™ may crash upon launching this game when running DirectX®12.
  • AMD cleanup utility may clean up chipset/RAID installer related folders/registries from the system.
  • Some Radeon Graphics products may experience lower than expected performance in Destiny 2™ when compared to previous Radeon Software versions.
  • Upon joining the AMD User Experience Program, the AMD User Experience Program Master service may have higher than expected CPU utilization.
  • Enabling Ray Tracing while running Ring of Elysium™ on DirectX®12 may cause this game to crash.

Known Issues​

  • Resident Evil Village™ may experience an intermittent application hang or TDR on AMD Radeon VII graphics products in the first mission of the game.
  • Enhanced Sync may cause a black screen to occur when enabled on some games and system configurations. Any users who may be experiencing issues with Enhanced Sync enabled should disable it as a temporary workaround.
  • Connecting two displays with large differences in resolution/refresh rates may cause flickering on Radeon RX Vega series graphics products.
  • An Oculus service error may be received on Radeon RX 5000 & 6000 series graphics products which prevents the Oculus Link setup software from running.
  • Radeon performance metrics and logging features may intermittently report extremely high and incorrect memory clock values.
  • If Ryzen Master is not detected in Adrenalin software after installation, a system restart may be required.
  • If Blue or Black screen is observed in mobile systems, temporarily disable Enhanced sign-in
  • A driver mismatch error may appear when two versions of Radeon software (Windows Store & AMD Support versions) are installed on your system. As a temporary workaround, launch the Windows Store version of Radeon software.
  • AMD is investigating an issue that may cause a small impact to battery life on AMD Ryzen 5000 notebooks.
  • A Blue or Black screen may be observed after updating to the latest Radeon Software. A workaround is to disable core isolation.
  • AMD is investigating a D3 error code that may be seen in some motherboard after updating to the latest Radeon Software.
  • Lower than expected performance may be observed on select AMD Athlon™ mobile systems.

AMD Link for Windows Known Issues​

  • Intermittent grey frame corruption might be observed when streaming with HEVC on certain configurations via an Internet connection. A workaround is to use the AVC encoding setting instead.

Important Notes​

  • Support for Windows® 7 based operating systems and some older generations of AMD Radeon™ Graphics products have been moved to a legacy support model. Learn more from AMD here.
  • Improvements have been made to the Radeon Software installation experience to address scenarios where a legacy AMD Radeon™ Graphics product is paired with a non-legacy AMD Radeon™ Graphics product in a single system configuration. Learn more from AMD here.

Rocky Linux’s first general release

Rocky Linux—one of at least two new distributions created to fill the void left when CentOS Linux was discontinued by parent corporation Red Hat—announced general availability of Rocky Linux 8.4 today. Rocky Linux 8.4 is binary-compatible with Red Hat Enterprise Linux 8.4, making it possible to run apps designed and tested only for RHEL without RHEL itself.
Like any other Linux distro, you can simply download an ISO of Rocky Linux and install it from scratch. But since Rocky Linux is specifically intended to serve as an easy replacement for similar distributions, it comes with easy-to-use conversion scripts as well.

Sony Wins Pirate Site Blocking Order Against DNS-Resolver Quad9

Sony Music has obtained an injunction that requires the freely available DNS-resolver Quad9 to block a popular pirate site. The order, issued by the District Court in Hamburg, Germany, is the first of its kind. The Quad9 foundation has already announced that it will protest the judgment, which could have far-reaching consequences.

Copyright holders have made serious work of website blocking in Germany. A few months ago a voluntary agreement was announced with the country’s largest ISPs, which agreed to block pirate sites after a verification process. This is a major win for rightsholders, but one that can be easily defeated. The Internet providers use relatively simple DNS blockades which can be circumvented by switching to third-party DNS resolvers such as Google, Cloudflare or Quad9, which are all free to use. However, that loophole may not last forever.

Last week Sony Music obtained an injunction at the District Court of Hamburg which requires the Swiss DNS-resolver Quad9 to block access to a site that’s frequently used to host pirated music. While the site remains unnamed, the consequences could be far-reaching. The Hamburg court found that the DNS service is not eligible for the liability protections that other third-party intermediaries such as ISPs and domain registrars typically enjoy. And if Quad9 fails to comply with the injunction, it will have to pay a fine of 250,000 euros per ‘infringing’ DNS query plus potentially two years in prison. One of the arguments that Sony brought up in court was that Quad9 already blocks various problematic sites voluntarily. In fact, the DNS-resolver promotes threat blocking as a feature.

Agent Tesla Disguised as COVID-19 Vaccination Registration

A recent phishing campaign targeting Windows machines is attempting to infect users with one of the most recent versions of the Agent Tesla remote access Trojan (RAT).

The malicious campaign, spotted by the Bitdefender Antispam Lab, tries to deliver the malicious payload under the guise of a COVID-19 vaccination schedule that comes as an attachment. Most of the attacks seem to have originated from IP addresses in Vietnam. Although telemetry shows a global dispersion of the malspam campaign, 50% of the malicious emails were directed to South Korea. The messages are designed to look like a business email asking the recipients to go over some technical issues presented in the attachment and register for the vaccine. “Attached herewith is the revised circular,” the malicious email reads. “There are some technical issues in the registration link provided in the circular yesterday. Kindly refer to the attached link. For those who had successful register earlier, kindly ignore this email.”
AgentTesla-Malspam-Campaign.jpg
Active for over seven years, Agent Tesla has been used frequently in phishing campaigns seeking to steal user credentials, passwords and sensitive information. The updated password-stealing capabilities and security-dodging techniques paired with the malware distribution-as-a-service business model have proven highly profitable. Agent Tesla’s popularity surged during the second half of 2020, with more than 46% of all global Agent Tesla reports occurring in Q4.

The malicious attachment (AC 2021 09 V1.doc) is in fact a RTF document exploiting a known Microsoft Office vulnerability. Once accessed, the document downloads Agent Tesla malware. After the malware has collected all the information from the victim’s system, it exfiltrates the credentials and other sensitive data via the SMTP protocol (email) back to an email account registered in advance by the attackers.

hello i just get this virus docx.sspq

i cant Decrypt it with the emisoft tool it said >>File: C:\Users\sajad\Desktop\ذرعات المقاولين\الادارة.docx.ss>>Error: No key for New Variant online ID: gJgQY6SVdLXPjkuB3aZkMkSq7nxkqRNBOOtMiWNT<<<Notice: this ID appears to be an online ID, decryption is impossible

AdGuard v1.9.19 for Safari: M1 support and updated Safari rules converter

We're back with an update of AdGuard for Safari. Though the last time we covered its release was quite a while ago, the product has been growing and developing all this time. Below you can find out what's new in the latest version.

You may have noticed that we had already released AdGuard for Safari. Sadly, we found a critical error that forced us to cancel v1.9.17. Now that we've fixed everything, we are re-releasing it feeling confident: the extension operates smoothly!

Apple silicon support
In November 2020, Apple began the switch from Intel processors to self-developed M1 chips. At the Apple Event, the manufacturer unveiled the new MacBooks with Apple silicon and the new M1 chip. But what is the fundamental difference between Intel and M1? We will try to explain it without getting too technical.

The brand new M1 processor is the first one in the family of ARM-based (Advanced RISC Machine) processors. M1 is a so-called system on a chip (SoC) that integrates components: USB controllers, Wi-Fi, Thunderbolt (interface), processor cores, video cards, and random-access memory (RAM). Unlike the old motherboard-based PC architecture, which separates components based on function, the new ARM аrchitecture brings them as close as possible. SoCs are great in terms of speed, as they allow to minimize latency for some functions: when elements are laid out in close proximity to each other, the interconnection delays can be minimized, while the data communication speed between modules, functional units, and memories is maximized.

We've been trying hard to make Macs with the new architecture compatible with the AdGuard extension for Safari, and are happy to introduce the result: a universal build that operates on both Intel and M1 processors.

Updated rules converter
We use rules converter only in two our products — AdGuard for iOS and AdGuard for Safari. It is required to convert AdGuard filtering rules into the ones of Safari, as their syntax differs from the commonly accepted one. In v1.9.17, we've added support for the $denyallow and $specifichide modifiers, cosmetic rules and Generic rules (exception rules modifiers), and fixed conversion errors.

Besides the converter, we've updated the app icon. And we couldn't do without fixing minor bugs, UI related and others.

Download AdGuard for Safari and share with us your thoughts on the new version. We'll be waiting for your feedback!

(technology/political )Iron dome and the guardian of the walls operation

What you guys think about the operation guardian of the walls and the iron dome ?
Here is a one sided video from my sides and yes doesn’t include lies but is one sided

iPhone 13 name off-putting, say Apple fans; iPhone (2021) better

The iPhone 13 name would be off-putting to some 18% of iPhone and iPad users, who would describe themselves as triskaidekaphobic – that is, having a fear of the number 13.
The preferred alternative name would be iPhone (2021)…

The survey was carried out by SellCell, which posed the question, “Could naming the next Apple smartphone ‘iPhone 13 put you off as the number 13 can be deemed unlucky?”
  • One in five iPhone and iPad users (18.3%) revealed they would be put off by the “iPhone 13” moniker
  • Men (24.9%) are about twice as likely to be affected by triskaidekaphobia than women (11.7%)
  • 81.7% said it wouldn’t affect their purchase decisions
The preferred alternative name would be to simply use the product name and year, much like Apple does for Macs and iPads.

Leaked memo confirms OnePlus will become an Oppo sub-brand

Last week OnePlus CEO Pete Lau said in a forum post that the company will “further integrate” with Oppo, but didn’t elaborate on how that’d work in practise. Now, leaker Evan Blass has obtained a document that serves as a talking points memo for use by OnePlus PR, and it explains the integration in plainer terms.

“With the integration, OnePlus becomes a brand within Oppo, however will continue to function as an independent entity,” reads the most pertinent answer. The memo also says that Lau’s role as chief product officer at Oppo will make him responsible for the product strategies of both Oppo and OnePlus.

The rest

DroidMorph Shows Popular Android Antivirus Fail to Detect Cloned Malicious Apps

A new research published by a group of academics has found that anti-virus programs for Android continue to remain vulnerable against different permutations of malware, in what could pose a serious risk as malicious actors evolve their toolsets to better evade analysis.

"Malware writers use stealthy mutations (morphing/obfuscations) to continuously develop malware clones, thwarting detection by signature based detectors," the researchers said. [PDF] "This attack of clones seriously threatens all the mobile platforms, especially Android."

The findings were published in a study last week by researchers from Adana Science and Technology University, Turkey, and the National University of Science and Technology, Islamabad, Pakistan.

Unlike iOS, apps can be downloaded from third-party sources on Android devices, raising the possibility that unwitting users can install unverified and lookalike apps that clone a legitimate app's functionality but are built to trick targets into downloading apps laced with fraudulent code that are capable of stealing sensitive information.

debian no longer supports UEFI on arm64

I was greeted with this message yesterday evening while running updates on my Debian 10 platform:

arm64 problems​


Debian no longer supports UEFI Secure Boot on arm64 systems, as of May 2021.

Shim and other EFI programs have always been difficult to build on arm64, compared to x86 platforms. Binutils for amd64 and i386 includes explicit support for creating programs in the PE/COFF binary format that EFI uses, but this has never been added for arm64.

In the past, shim developers added some local hacks into the shim package to generate a mostly-compliant PE/COFF EFI binary without this toolchain support, and that seemed to be sufficient for use. Everything seemed to work. However, during the development and testing phase of shim 15.3 and 15.4, we found found significant issues with this approach. New security features needed in shim (SBAT) showed up severe problems with the lack of proper toolchain support. See Significant problems with Aarch64 (and Arm?) builds · Issue #366 · rhboot/shim for more details. The old hacks around binutils are no longer sustainable.

Statistics tell us that very few people have attempted to use arm64 Secure Boot with Debian so far. In the interests of releasing needed updates in a timely manner, we have decided for the time being to disable signed shim support for Debian arm64.

We hope to re-introduce arm64 Secure Boot support as soon as possible in the future.

SecureBoot - Debian

Very disappointing :(

Windows Product Key

Hello,

How can I find out my windows product key since i have official operating system?

I have been told that is it true that if i buy SSD disk i cannot use the current product key from my HDD because only 1 key per disk?

Regards.

Online qscx ransomware decryption

My system got infected with a STOP Djvu ransomware that encrypted all my files with qscx extension, I spent a lot of time online looking for a solution and I couldn't because it is online encryption with an ID of PEkuCwzHhIAUpZc58QNSfWeTQEqZYQlPXyvuK0GI.
I have tried all the currently available solutions like recovery, etc, and nothing seems to work. I know that there is currently no way to decrypt the files with an online ID and we need to wait for an official decryption tool for this new ransomware, however, my question is if the official decryption tool will be able to decrypt the online IDs or I should just give up on my files?

Poshukach

Hi! I can't remove poshukach dot com from my browser. I want the old one back. Please help

How Phishing Works and why Criminals make more Money with email than Ransomware

The Phishing Landscape – Christine Bejerasco
Phishing is a 20-year-old problem that’s evolved to remain technologically relevant. Phishing URLs, for instance, are platform-agnostic threats that rely on tricking unsuspecting users on any device with a browser. Because phishing is constantly changing, it’s important to stay informed on current trends. What's happening in the phishing landscape? What kind of techniques are prevalent? What kind of information are attackers looking for? Answers to these questions can prove invaluable to defenders trying to fight these attacks.

Anatomy of Phishing Campaigns – Laura Kankaala
Phishing is a great way to gain an initial foothold into a company's digital estate. Criminals are actively seeking out ways to conduct more effective phishing campaigns – and so are we at F-Secure. What kind of tactics and tech are criminals using when they design and execute phishing campaigns? And can you detect a sophisticated phishing attack?

Business Email Compromise – Mikko Hypponen 
Business Email Compromise (BEC) is an old problem that just keeps getting worse. Statistics show that BEC attacks make more money than ransomware attacks, which is a remarkable achievement for the criminals. Why are these attacks effective? Why do well-trained billion-dollar companies fall for these scams? Where does the money go? What's the future for these attacks? And how do you defend against them?
  • Published
    Apr 8, 2019
  • Page views
    4,449
Top