{"id":28595,"date":"2024-06-19T09:03:00","date_gmt":"2024-06-19T13:03:00","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=28595"},"modified":"2024-06-19T09:03:42","modified_gmt":"2024-06-19T13:03:42","slug":"wednesday-newsbytes-windows-flaw-allows-hackers-to-infect-pcs-over-wi-fi-ai-movies-coming-soon-another-urgent-warning-to-chrome-users-phishing-emails-abuse-windows-search-and-more","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-windows-flaw-allows-hackers-to-infect-pcs-over-wi-fi-ai-movies-coming-soon-another-urgent-warning-to-chrome-users-phishing-emails-abuse-windows-search-and-more\/","title":{"rendered":"Wednesday Newsbytes: Windows Flaw Allows Hackers to Infect PCs Over Wi-Fi; AI Movies Coming Soon; Another Urgent Warning to Chrome Users; Phishing Emails Abuse Windows Search&#8230; and more"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Wednesday Newsbytes: Windows Flaw Allows Hackers to Infect PCs Over Wi-Fi<\/span><\/strong><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">; AI Movies Coming Soon; Another Urgent Warning to Chrome Users<\/span><\/strong><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">; Phishing Emails Abuse Windows Search<\/span><\/strong><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">&#8230; and more<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Every day we scan the tech world for interesting news in the world of technology and sometimes from outside the world of technology. Every Wednesday, we feature news articles that grabbed our attention over the past week. We hope you find this week&#8217;s\u00a0 &#8216;Wednesday Newsbytes&#8217; informative and interesting!<\/span><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.tomsguide.com\/computing\/malware-adware\/urgent-windows-security-flaw-lets-hackers-infect-your-pc-over-wi-fi-update-right-now\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Urgent Windows security flaw lets hackers infect your PC over Wi-Fi \u2014 update right now<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Windows Wi-Fi driver bug makes public Wi-Fi even more dangerous<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Hackers often use malicious documents or pirated software as a means of getting their malware onto vulnerable devices, but a new Windows flaw could let them do so over Wi-Fi.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">As reported by Forbes, this new Wi-Fi vulnerability (tracked as CVE-2024-30078) affects all versions of Windows, and if exploited, it can be used by an attacker to infect vulnerable PCs with malware.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The flaw itself has a CVSS score of 8.8 out of 10, and what makes it particularly dangerous is the fact that an attacker doesn\u2019t need physical access to a target system. They do however have to be on the same Wi-Fi network to exploit it.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Here\u2019s everything you need to know about this new critical flaw along with some tips on how to keep your own Windows PC or laptop safe from hackers&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.tomsguide.com\/computing\/malware-adware\/urgent-windows-security-flaw-lets-hackers-infect-your-pc-over-wi-fi-update-right-now\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong><span style=\"text-decoration: underline;\"><span style=\"font-size: 18pt;\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><span style=\"font-size: 18pt;\">Read more at Tom&#8217;s Guide.<\/span><\/span><\/span><\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.techradar.com\/computing\/artificial-intelligence\/ai-generated-movies-will-be-here-sooner-than-you-think-and-this-new-google-deepmind-tool-proves-it\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 24pt;\">AI-generated movies will be here sooner than you think \u2013 and this new Google DeepMind tool proves it<\/span><\/strong><\/span><\/a><\/p>\n<p><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Impressive and scary, in equal measure<br \/>\n<\/span><\/p><\/blockquote>\n<blockquote><p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">AI video generators like OpenAI&#8217;s Sora, Luma AI&#8217;s Dream Machine, and Runway Gen-3 Alpha have been stealing the headlines lately, but a new Google DeepMind tool could fix the one weakness they all share \u2013 a lack of accompanying audio.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A new Google DeepMind post has revealed a new video-to-audio (or &#8216;V2A&#8217;) tool that uses a combination of pixels and text prompts to automatically generate soundtracks and soundscapes for AI-generated videos. In short, it&#8217;s another big step toward the creation of fully-automated movie scenes.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">As you can see in the videos below, this V2A tech can combine with AI video generators (including Google&#8217;s Veo) to create an atmospheric score, timely sound effects, or even dialogue that Google DeepMind says &#8220;matches the characters and tone of a video&#8221;.<\/span><\/p>\n<p>https:\/\/youtu.be\/b6Elcke3JMc<\/p><\/blockquote>\n<p><a href=\"https:\/\/www.techradar.com\/computing\/artificial-intelligence\/ai-generated-movies-will-be-here-sooner-than-you-think-and-this-new-google-deepmind-tool-proves-it\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline; font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 18pt;\">Read more at TechRadar.<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.dailymail.co.uk\/sciencetech\/article-13543313\/Google-Chrome-cyberattack-fake-updates-Microsoft-Powershell.html\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Urgent warning to Google Chrome users after cyberattack targets browser with fake error messages &#8211; here&#8217;s how to protect yourself<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Security experts issued a warning to Google Chrome users after uncovering a cyberattack targeting the browser, as well as Microsoft&#8217;s Word and OneDrive apps.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The attack has used fake error messages to trick users into installing the malicious software themselves as a &#8216;fix.&#8217;<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Hackers are sending notifications through email as well as website pop-ups, which claim the user has experienced a software malfunction and need of a quick update.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">To spot a fake, experts have advised users to be wary of messages that claim a fix will require them to install a &#8216;root certificate&#8217; by copying and pasting raw code.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">While the cyberattack is capable of stealing all manner of private digital data, some of the new malware appears primed for stealing cryptocurrencies, like bitcoin.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Hackers have a new tactic for sneaking malware onto your computer &#8211; fake updates to Google&#8217;s Chrome browser, as well as Microsoft&#8217;s Word and OneDrive products&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.dailymail.co.uk\/sciencetech\/article-13543313\/Google-Chrome-cyberattack-fake-updates-Microsoft-Powershell.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">Read more at Daily Mail<\/span><\/strong><\/span><span style=\"text-decoration: underline;\"><strong>.<\/strong><\/span><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishing-emails-abuse-windows-search-protocol-to-push-malicious-scripts\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 24pt;\">Phishing emails abuse Windows search protocol to push malicious scripts<\/span><\/strong><\/span><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A new phishing campaign uses HTML attachments that abuse the Windows search protocol (search-ms URI) to push batch files hosted on remote servers that deliver malware.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The Windows Search protocol is a Uniform Resource Identifier (URI) that enables applications to open Windows Explorer to perform searches using specific parameters.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">While most Windows searches will look at the local device&#8217;s index, it is also possible to force Windows Search to query file shares on remote hosts and use a custom title for the search window.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Attackers can exploit this functionality to share malicious files on remote servers, as Prof. Dr. Martin Johns first highlighted in a 2020 thesis.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In June 2022, security researchers devised a potent attack chain that also exploited a Microsoft Office flaw to launch searches directly from Word documents.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Trustwave SpiderLabs researchers now report that this technique is used in the wild by threat actors who are using HTML attachments to launch Windows searches on attackers&#8217; servers.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Abusing Windows Search<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The recent attacks described in the Trustwave report start with a malicious email carrying an HTML attachment disguised as an invoice document placed within a small ZIP&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishing-emails-abuse-windows-search-protocol-to-push-malicious-scripts\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong><span style=\"text-decoration: underline;\"><span style=\"font-size: 18pt;\">Read more at Bleeping Computer<\/span><\/span><\/strong><span style=\"font-size: 18pt;\"><strong><span style=\"text-decoration: underline;\">.<\/span><\/strong><\/span><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.windowscentral.com\/software-apps\/windows-11\/whats-new-in-the-settings-app-on-windows-11-version-24h2\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">What&#8217;s new in the Settings app on Windows 11 version 24H2<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">These are the changes rolling out for the Settings app with the Windows 11 2024 Update.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Windows 11 version 24H2 (2024 Update) includes a newer release of the Settings app with various improvements and new options, allowing you to configure more features without the Control Panel.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In this version, you will find that the development team is porting the Color Management legacy settings to the newer experience. Microsoft is also introducing a new Energy Saver feature, a microphone testing tool, and an option to enable the Sudo command.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In the printer settings, you can now enable the Windows Protected Print Mode, and you get the option to pause print jobs and rename your printer.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Furthermore, the Settings app improves the settings for Storage Spaces, Color filters, Privacy, and more.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In this guide, I&#8217;ll explain the new changes available in the Settings app for the 2024 Update&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.windowscentral.com\/software-apps\/windows-11\/whats-new-in-the-settings-app-on-windows-11-version-24h2\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><strong><span style=\"text-decoration: underline;\">Read more at Windows Central.<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt; color: #3366ff;\"><strong><em><span style=\"color: #ff6600;\">Thanks for reading this week&#8217;s Wednesday Newbytes. We hope these articles were informative, interesting, fun, and helpful.<\/span> <span style=\"color: #ff6600;\">Darcy &amp; TC<\/span><\/em><\/strong><\/span><\/p>\n<p><a href=\"https:\/\/thundercloud.net\/donation.htm\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/thundercloud.net\/infoave\/images\/2017\/goodfight2017.png\" alt=\"Help us help you!\" width=\"573\" height=\"136\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Wednesday Newsbytes: Windows Flaw Allows Hackers to Infect PCs Over Wi-Fi; AI Movies Coming Soon; Another Urgent Warning to Chrome Users; Phishing Emails Abuse Windows Search&#8230; and more Every day we scan the tech world for interesting news in the world of technology and sometimes from outside the world of technology. Every Wednesday, we feature news articles\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-windows-flaw-allows-hackers-to-infect-pcs-over-wi-fi-ai-movies-coming-soon-another-urgent-warning-to-chrome-users-phishing-emails-abuse-windows-search-and-more\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":23363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4421,4401,2574,4430,1678,1669,2509,1,1426,1656,1674,4372,4353,4221,4477],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28595"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=28595"}],"version-history":[{"count":4,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28595\/revisions"}],"predecessor-version":[{"id":28600,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28595\/revisions\/28600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/23363"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=28595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=28595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=28595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}