{"id":23482,"date":"2022-05-11T09:18:07","date_gmt":"2022-05-11T13:18:07","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=23482"},"modified":"2022-05-11T09:18:07","modified_gmt":"2022-05-11T13:18:07","slug":"wednesday-newsbytes-news-for-you-051122","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-news-for-you-051122\/","title":{"rendered":"Wednesday Newsbytes &#8211; News for You &#8211; 051122"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\"><strong>Wednesday Newsbytes &#8211; News for You &#8211; 051122<\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Every day we scan the tech world for news that affects all of us who use Windows computers. Every Wednesday, we feature some of the news articles that grabbed our attention over the past week. We hope you find this week&#8217;s\u00a0 &#8220;Wednesday Newsbytes&#8221; informative and interesting!<\/span><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.pcgamer.com\/oh-great-hackers-found-a-new-way-to-sneak-malware-into-your-computer\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Oh great, hackers found a new way to sneak malware into your computer<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 18pt; color: #999999;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">Experts catch hackers using Windows event logs to hide malware.<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Cybersecurity experts recently discovered a new technique for storing malware on an unsuspecting PC. Used by hackers, it involves slipping malware inside of Windows 11 event logs. To make matters worse, this new technique is designed to make the infection process nearly impossible to detect until it&#8217;s too late.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Researchers at Kaspersky (thanks Bleeping Computer) analyzed a recent sample of the malware on a customer&#8217;s computer in February of this year. During their analysis, they found that a hacker was able to plant fileless malware into a victim&#8217;s file system by hiding it away in your Windows events logs. A first, according to Kaspersky.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">This sophisticated attack injects shellcode payloads into Windows event logs into the KMS (Key Management Services) via a custom malware dropper and basically hides in plain sight.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The dropper then loads malicious code by taking advantage of a DLL exploit and hides itself as a copy of a legitimate error file. So, even if you check your event logs, it&#8217;ll look like nothing out of the ordinary. The attacker can then install a Trojan virus (or, in this case, a number of Trojans), which will wreak havoc on a system.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Denis Legezo, lead security researcher at Kaspersky, told Bleeping Computer that \u201cthe actor behind the campaign is rather skilled by itself, or at least has a good set of quite profound commercial tools.&#8221; The purpose of the attack is to obtain valuable user data.<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.pcgamer.com\/oh-great-hackers-found-a-new-way-to-sneak-malware-into-your-computer\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 18pt;\"><strong><span style=\"text-decoration: underline;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Read the rest at PC Gamer<\/span><\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\"><a href=\"https:\/\/www.techradar.com\/uk\/news\/microsofts-one-outlook-has-leaked-but-people-already-think-it-sucks\" target=\"_blank\" rel=\"noopener\">Microsoft&#8217;s One Outlook has leaked, but people already think it sucks<\/a><\/span><\/strong><\/p>\n<p><span style=\"color: #999999;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">It&#8217;s a tough crowd<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">It&#8217;s been rumored that Microsoft has been developing One Outlook for some time, but a fresh leak suggests we&#8217;re closer than ever to finally getting our hands on the all-in-one email client.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The leak was spotted by Temmie on Telegram and then posted to Twitter by @TomWarren , and looks visually very similar to the current Outlook Web service, with the exception of embedded window controls.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">For those unaware, One Outlook (previously codenamed &#8216;Project Monarch&#8217;) will see Windows 11 applications like Outlook, Calendar and Contacts consolidated into a single app that works across PC, Mac and the web in order to replace its existing Outlook clients for desktop including Outlook Web, Outlook (Win32) for Windows, Outlook for Mac and Mail and Calendar on Windows 10.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">This isn&#8217;t actually the first time that One Outlook has leaked. A version of the app appeared last year, but wasn&#8217;t accessible to anyone who worked outside of Microsoft, so this is the first version we&#8217;ve seen that works on work and education accounts.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The new app doesn&#8217;t appear to be working on personal Outlook accounts yet sadly, though those with access to an education or work account can give the beta version of One Outlook a whirl&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.techradar.com\/uk\/news\/microsofts-one-outlook-has-leaked-but-people-already-think-it-sucks\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><strong>Read the rest at Tech Radar<\/strong><\/span><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/abc7chicago.com\/what-is-doxxing-social-media-instagram-account-facebook-login\/11827144\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 24pt;\">What is &#8216;doxxing?&#8217; How to protect yourself from scammers after your social media, messages<\/span><\/strong><\/span><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">CHICAGO (WLS) &#8212; Over 43 million Americans have personally experienced &#8220;doxxing.&#8221;<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Yet, many people don&#8217;t know what Doxxing is. In short, it&#8217;s when an internet troll or a scammer obtains your social media posts, messages, documents or pictures to embarrass or blackmail you. According to a new\u00a0<a href=\"https:\/\/www.safehome.org\/family-safety\/doxxing-online-harassment-research\/\" target=\"_blank\" rel=\"nofollow noopener\">Safehome report<\/a>, one in four of the &#8220;Doxxers&#8221; know their targets.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">You should:<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">&#8211; Beware of what you&#8217;re posting, even if your settings are on private. Especially beware of making inappropriate comments or declaring strong political opinions.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">&#8211; Practice good internet citizenship. Be careful of what you post. If you wouldn&#8217;t want your boss or family seeing it, maybe think twice before hitting send.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">&#8211; Make sure you have a strong passwords on your cloud, social media sites and WiFi network.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">&#8211; Use Virtual Private Networks to guard devices on public connections.<\/span><\/p><\/blockquote>\n<p><span style=\"text-decoration: underline;\"><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\"><a href=\"https:\/\/abc7chicago.com\/what-is-doxxing-social-media-instagram-account-facebook-login\/11827144\/\" target=\"_blank\" rel=\"noopener\">Watch the accompanying video here<\/a><\/span><\/strong><\/span><\/p>\n<hr \/>\n<blockquote><p><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 24pt;\"><a href=\"https:\/\/www.techradar.com\/uk\/news\/google-is-launching-a-major-crackdown-on-dodgy-ads\" target=\"_blank\" rel=\"noopener\">Google is launching a major crackdown on dodgy ads<\/a><\/span><\/strong><\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif; color: #999999;\">Billions of ads and millions of accounts removed from the network<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Google removed billions of ads, and banned millions of advertiser accounts from its Google Ads network, all in a bid to protect its users from various malicious actors and fraudsters in 2021.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The news was contained in Google&#8217;s newly-published 2021 Ads Safety Report, stating user safety is \u201cat the very top\u201d of its list of priorities.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Overall, Google says it removed 3.4 billion ads, restricted more than 5.7 billion ads, and banned 5.6 million advertiser accounts.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">New policies and systems<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Of the 3.4 billion removed ads, 650 million were nixed for abusing the ad network, while 280 violated rules regarding adult content. 137 million were removed for trademark violations, while 125.6 million carried \u201cinappropriate content\u201d. Other reasons why ads were removed are related to misrepresentation, gambling, healthcare, copyrights, and alcohol.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Google also said it stopped inappropriate ads from being displayed on some 1.7 billion publisher pages, and 63,000 publisher sites.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">All of this was made possible, Google says, due to new policies and systems being brought in place last year.<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.techradar.com\/uk\/news\/google-is-launching-a-major-crackdown-on-dodgy-ads\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Read more at Tech Radar<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\"><a href=\"https:\/\/www.reviewed.com\/tech\/features\/how-properly-dispose-e-waste?utm_source=usat&amp;utm_medium=referral&amp;utm_campaign=collab\" target=\"_blank\" rel=\"noopener\">Don\u2019t throw your old tech in the trash\u2014here\u2019s what to do instead<\/a><\/span><\/strong><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif; color: #999999;\">There are better places for your old tech than the landfill.<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">When you find yourself with a bunch of electronic junk you want out of your home, it can be hard to figure out how to properly dispose of it. Chucking it in the trash is not only harmful to the environment but it also might be against the law depending on what you need to dispose of. However, there are a dizzying number of options to safely and responsibly get rid of old tech. If your tech\u2019s still in good working condition, you might even be able to get paid to part with it.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Prepare your old tech for recycling or donation<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Before we can talk about where to dispose of old tech, we need to go over how to prep your tech for proper disposal. Tech can have sensitive data on it, such as your social security number or bank login information. To keep your data safe, either remove or wipe any storage drives in the device before disposing of it.\u00a0<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">If you have a bad battery that you need to dispose of, you\u2019ll want to take a few precautions for your safety and for the environment\u2019s safety. The United States Environmental Protection Agency recommends you tape the conductive ends of batteries with non-conductive tape (electrical tape, for instance) and place disposable batteries in a plastic bin or container. This reduces the risk of a fire.<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.reviewed.com\/tech\/features\/how-properly-dispose-e-waste?utm_source=usat&amp;utm_medium=referral&amp;utm_campaign=collab\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\"><span style=\"font-size: 14pt;\"><span style=\"font-size: 18pt;\">Read more at Reviewed<\/span><\/span>.com<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<p><span style=\"color: #000000;\"><em><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Thanks for reading this week&#8217;s Wednesday Newbytes. We hope you found these articles useful, informative, interesting, and helpful. Darcy &amp; TC<\/span><\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Wednesday Newsbytes &#8211; News for You &#8211; 051122 Every day we scan the tech world for news that affects all of us who use Windows computers. Every Wednesday, we feature some of the news articles that grabbed our attention over the past week. We hope you find this week&#8217;s\u00a0 &#8220;Wednesday Newsbytes&#8221; informative and interesting! Oh great,\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-news-for-you-051122\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":23363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1655,2247,2509,1426,1670,1682,1680,1656,1674,4353,4221],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/23482"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=23482"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/23482\/revisions"}],"predecessor-version":[{"id":23485,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/23482\/revisions\/23485"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/23363"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=23482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=23482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=23482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}