{"id":23519,"date":"2022-05-18T10:34:25","date_gmt":"2022-05-18T14:34:25","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=23519"},"modified":"2022-05-18T10:34:25","modified_gmt":"2022-05-18T14:34:25","slug":"wednesday-newsbytes-news-for-you-051822","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-news-for-you-051822\/","title":{"rendered":"Wednesday Newsbytes &#8211; News for You &#8211; 051822"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\"><strong>Wednesday Newsbytes &#8211; News for You &#8211; 051822<\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Every day we scan the tech world for news that affects all of us who use Windows computers. Every Wednesday, we feature some of the news articles that grabbed our attention over the past week. We hope you find this week&#8217;s\u00a0 &#8220;Wednesday Newsbytes&#8221; informative and interesting!<\/span><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/05\/some-top-100000-websites-collect-everything-you-type-before-you-hit-submit\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Some top 100,000 websites collect everything you type\u2014before you hit submit<\/span><\/strong><\/a><\/p>\n<p><span style=\"color: #999999;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">A number of websites include keyloggers that covertly snag your keyboard inputs.<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">When you sign up for a newsletter, make a hotel reservation, or check out online, you probably take for granted that if you mistype your email address three times or change your mind and X out of the page, it doesn&#8217;t matter. Nothing actually happens until you hit the Submit button, right? Well, maybe not. As with so many assumptions about the web, this isn&#8217;t always the case, according to new research: A surprising number of websites are collecting some or all of your data as you type it into a digital form.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Researchers from KU Leuven, Radboud University, and University of Lausanne crawled and analyzed the top 100,000 websites, looking at scenarios in which a user is visiting a site while in the European Union and visiting a site from the United States. They found that 1,844 websites gathered an EU user&#8217;s email address without their consent, and a staggering 2,950 logged a US user&#8217;s email in some form. Many of the sites seemingly do not intend to conduct the data-logging but incorporate third-party marketing and analytics services that cause the behavior.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">After specifically crawling sites for password leaks in May 2021, the researchers also found 52 websites in which third parties, including the Russian tech giant Yandex, were incidentally collecting password data before submission. The group disclosed their findings to these sites, and all 52 instances have since been resolved.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">&#8216;If there\u2019s a Submit button on a form, the reasonable expectation is that it does something\u2014that it will submit your data when you click it,&#8217; says G\u00fcne\u015f Acar, a professor and researcher in Radboud University&#8217;s digital security group and one of the leaders of the study. &#8216;We were super surprised by these results. We thought maybe we were going to find a few hundred websites where your email is collected before you submit, but this exceeded our expectations by far.&#8217;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/05\/some-top-100000-websites-collect-everything-you-type-before-you-hit-submit\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"text-decoration: underline; font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Read the rest at Ars Technica<\/span><\/strong><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/a-tip-for-windows-11-tips\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\">Beware: This cheap and &#8216;homemade&#8217; malware is surprisingly effective<\/span><\/strong><\/a><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif; color: #999999;\">DCRat malware targets Windows devices. And it&#8217;s cheap and popular, which makes it a problem.<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A powerful form of trojan malware that offers complete backdoor access to Windows systems is being sold on underground forums for the price of a cup of coffee \u2013 and it&#8217;s being developed and maintained by one person.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Known as DCRat, the backdoor malware has existed since 2018 but has since been redesigned and relaunched.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">When malware is cheap it&#8217;s often associated with only delivering limited capabilities. But DCRat \u2013 offered online for as little as $5 \u2013 unfortunately comes equipped with a variety of a functions, including the ability to steal usernames, passwords, credit card details, browser history, Telegram login credentials, Steam accounts, Discord tokens, and more.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">DCRat can also take screenshots, steal clipboard contents and contains a keylogger that can track anything the victim types onto their computer. It ultimately provides cyber criminals with full access to almost everything the victim does after downloading the malware.<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/beware-this-cheap-and-homemade-malware-is-surprisingly-effective\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><strong>Read the rest at ZDNet<\/strong><\/span><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.techradar.com\/uk\/news\/duckduckgo-slams-googles-new-tracking-systems\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">DuckDuckGo slams Google&#8217;s new tracking systems<\/span><\/strong><\/a><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif; color: #999999;\">Internet privacy company has taken issue with both Google Topics and FLEDGE<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">DuckDuckGo has once again taken issue with Google\u2019s plan to replace third-party cookies in Chrome by calling out the search giant\u2019s new Topics and FLEDGE tracking and ad targeting methods.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">While Topics uses your browsing history in Chrome to automatically collect information about your interests to share with tracking companies and other businesses, FLEDGE enables Google\u2019s browser to target users with ads based on their browsing history.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Although Google\u2019s intentions behind replacing third-party cookies with Topics and FLEDGE may be good, DuckDuckGo points out in a new blog post that tracking, targeting and profiling will still occur once Privacy Sandbox is rolled out in Chrome.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The company also notes that targeting in this way enables manipulation by exploiting personal vulnerabilities, discrimination since users may not see certain job posts based on their personal profiles and filter bubbles or echo chambers that can further divide people online. Additionally, Topics will be made available to third-party trackers and not just websites themselves.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">At the same time, Topics can be combined with an IP address or other fingerprinting attributes so that it is easier for users to be tracked individually by third-party trackers. Although Google has promised to address this issue at some point through a so-called \u201cprivacy budget\u201d, experts have already called the company\u2019s approach into question.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">How to opt out of Topics and FLEDGE<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The easiest and simplest way for privacy-conscious users to opt out of both Topics and FLEDGE is to simply stop using Chrome by switching to another modern browser instead. While DuckDuckGo recommends using its mobile browser on iOS and Android or its recently launched Desktop browser for Mac, Brave, Vivaldi and Microsoft Edge are good Chrome alternatives as well.<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.techradar.com\/uk\/news\/duckduckgo-slams-googles-new-tracking-systems\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Read more at Tech Radar<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 24pt;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-11-to-show-suggested-actions-when-copying-data-to-the-clipboard\/\" target=\"_blank\" rel=\"noopener\">Microsoft is testing a new &#8216;Suggested Actions&#8217; feature in Windows 11<\/a><\/span><\/strong><\/span><\/p>\n<p><span style=\"color: #999999;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Dev builds where the operating system suggests actions you can take with data you copy into the clipboard.<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">&#8230;Microsoft again began offering different builds in the &#8216;Dev&#8217; and &#8216;Beta&#8217; channels, with the beta channel receiving Windows 11 build 22621 and the Dev channel receiving Windows 11 build 25115.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">With Windows 11 build 25115, Microsoft introduced the new &#8216;Suggested Actions&#8217; feature, which causes an action bar to appear when you copy phone numbers, dates, or times from applications.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">For example, when you copy a number, Windows 11 will ask if you want to call that number using one of your installed click-to-dial supported programs.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">If you copy a date, Windows 11 prompts you to create an event in associated programs like Outlook or Calendar.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Once you select the action, Windows 11 will open the app and automatically fill in the appropriate task with the copied data.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">While the data types that work with this feature are currently limited, Microsoft could easily expand them based on feedback and popularity.<\/span><\/p><\/blockquote>\n<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-11-to-show-suggested-actions-when-copying-data-to-the-clipboard\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\"><span style=\"font-size: 14pt;\"><span style=\"font-size: 18pt;\">Read more at Bleeping Computer<\/span><\/span><\/span><\/strong><\/a><\/span><\/p>\n<hr \/>\n<p><span style=\"color: #339966;\"><em><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Thanks for reading this week&#8217;s Wednesday Newbytes. We hope you found these articles useful, informative, interesting, and helpful. Darcy &amp; TC<\/span><\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Wednesday Newsbytes &#8211; News for You &#8211; 051822 Every day we scan the tech world for news that affects all of us who use Windows computers. Every Wednesday, we feature some of the news articles that grabbed our attention over the past week. We hope you find this week&#8217;s\u00a0 &#8220;Wednesday Newsbytes&#8221; informative and interesting! Some top\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-news-for-you-051822\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":23363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1678,1669,1426,1680,1656,1674,4372,4353,4221],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/23519"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=23519"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/23519\/revisions"}],"predecessor-version":[{"id":23521,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/23519\/revisions\/23521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/23363"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=23519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=23519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=23519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}