{"id":29841,"date":"2025-02-20T07:38:56","date_gmt":"2025-02-20T12:38:56","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=29841"},"modified":"2025-02-20T07:39:54","modified_gmt":"2025-02-20T12:39:54","slug":"new-windows-11-update-breaks-file-explorer-new-chrome-browser-attack-could-affect-billions-new-windows-app-could-make-changing-computers-easy-and-more","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/new-windows-11-update-breaks-file-explorer-new-chrome-browser-attack-could-affect-billions-new-windows-app-could-make-changing-computers-easy-and-more\/","title":{"rendered":"New Windows 11 Update Breaks File Explorer; New Chrome Browser Attack Could Affect Billions; New Windows App Could Make Changing Computers Easy&#8230; and more!"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\"><strong>New Windows 11 Update Breaks File Explorer; New Chrome Browser Attack Could Affect Billions; New Windows App Could Make Changing Computers Easy<\/strong><\/span><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">&#8230; and more!<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Every day, we scan the tech world for interesting news, sometimes from outside the tech world. Every Thursday, we feature news articles that grabbed our attention over the past week. We hope you find this week&#8217;s &#8216;Thursday Newsbytes&#8217; informative and interesting!<\/span><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.laptopmag.com\/laptops\/windows-laptops\/windows-11-update-is-reportedly-breaking-the-operating-systems-most-vital-tool\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Windows 11 update is reportedly breaking the operating system&#8217;s most vital tool<\/span><\/strong><\/a><br \/>\n<span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">\u00a0 <\/span><br \/>\n<span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Windows 11&#8217;s KB5051987 update causes problems for File Explorer<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">At a pivotal moment in time when Microsoft should be winning the hearts and minds of desktop PC users by presenting a stable and reliable platform in Windows 11, the latest 24H2 update (KB5051987) has caused some users to face several major issues, including problems with the operating system&#8217;s most vital tool, File Explorer.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Growing complaints with the latest update are the last thing Microsoft will have wanted to see, with the company currently trying to woo as many Windows users as possible into upgrading to Windows 11 ahead of Windows 10&#8217;s October 14, 2025, end-of-support date.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Windows 11&#8217;s stability has often been called into question, and yet another update resulting in widespread reports of issues is unlikely to help the stigma surrounding the operating system.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">If you&#8217;re yet to download the latest KB5051987 security update, or encountering issues after doing so, read on for information on what to expect, and what you can do next&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.laptopmag.com\/laptops\/windows-laptops\/windows-11-update-is-reportedly-breaking-the-operating-systems-most-vital-tool\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"text-decoration: underline;\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><span style=\"font-size: 18pt;\">Read more at Laptop Magazine.<\/span><\/span><\/span><\/strong><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.techradar.com\/computing\/chrome\/a-new-chrome-browser-highjacking-attack-could-affect-billions-of-users-heres-how-to-fight-it\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">A new Chrome browser highjacking attack could affect billions of users &#8211; here&#8217;s how to fight it<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">It could even take over your OS<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Whether you believe it to be the best web browser, Google Chrome is undoubtedly the most popular search engine by a landslide. For that reason, it remains a popular target for hackers as well. And now, a massive new threat is on the horizon, which could threaten billions of users.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A new attack called \u2018Browser Syncjacking\u2019 has been discovered by security researchers at the cybersecurity firm SquareX (reported on by BleepingComputer). Though it requires several steps, it\u2019s shockingly easy for the average Chrome user to fall victim, as it needs minimal permissions.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">First, a malicious Google Workspace domain is created with multiple user profiles, and security features like multi-factor authentication are disabled. This is used to create managed profiles in the background of the victim\u2019s devices. Then, hackers will then create a malicious Chrome extension to launch on the official Chrome Store, appearing as a useful tool to attract potential victims.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Once any potential victims install the extension, it hides a browser window that runs in the background to log the victim into one of the Workspace profiles previously made. The final step involves tricking the victim into activating Chrome sync by opening a very real Chrome support page that\u2019s been tampered with, then guiding them through turning on sync. If this happens, that person\u2019s full Chrome account and stored data \u2014 including browsing history and passwords \u2014 are now available on the hacker\u2019s profile.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">From here, as SquareX explains, a victim\u2019s entire browser can be taken over, often through a seemingly innocent Zoom invite that, if accepted, gets malicious content from that Chrome extension injected into it. If the victim falls for a prompt that asks to update Zoom, the update (actually an executable file that contains an enrollment token) will allow the hacker to control the browser completely.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Not only does this give hackers free reign over any data stored in your browser and allow them to spy on any websites you browse (and see any sensitive information you input), but it also allows them to access your OS to \u201cinstall malware, capture keystrokes, extract sensitive data and even activate a device\u2019s webcam and microphone&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.techradar.com\/computing\/chrome\/a-new-chrome-browser-highjacking-attack-could-affect-billions-of-users-heres-how-to-fight-it\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong><span style=\"text-decoration: underline;\"><span style=\"font-size: 18pt;\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><span style=\"font-size: 18pt;\">Read More at TechRadar.<\/span><\/span><\/span><\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.pcworld.com\/article\/2612299\/please-please-please-let-this-windows-migrate-app-be-real.html\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">A Windows app that could make PC setup as easy as phones? Yes, please!<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Microsoft hasn&#8217;t announced it, but a pair of Windows hackers say a migration app is hidden inside a recent Windows test build.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Decades after Microsoft shipped Windows, there\u2019s still no mechanism for moving everything from one PC to another, in much the same way Android or iOS sets up a new device. But a solution may be on the way: MigrationApp, a tool that is seemingly hidden within new test builds of Windows.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Fingers crossed that MigrationApp (or Windows Migrate) is what it seems: a one-stop, one-size-fits-all solution to move every file on your existing PC to a new PC&#8230;.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Anyone who\u2019s used a smartphone, however, knows that easy-peasy data migration is one of the best things a phone offers. Google offers its own solution, as does Apple. Samsung does too. Do you want to move from Android to an iPhone? Not a problem&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.pcworld.com\/article\/2612299\/please-please-please-let-this-windows-migrate-app-be-real.html\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Read more at PC World.<\/span><\/strong><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.thecooldown.com\/green-business\/gemini-workspace-ai-email-assistant\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Millions of Google users alarmed after discovering new AI tool they can&#8217;t turn off \u2014 here&#8217;s the latest on the controversial update<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">&#8220;As useful as this can be, many users are less than enthusiastic.&#8221;<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In recent months, the AI revolution has permeated technology companies. From Apple&#8217;s AI notification summarization to Microsoft&#8217;s AI email assistance, tech companies are clearly embracing this new tech as the world races toward more advanced and profitable AI methods.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Google&#8217;s Gemini tool is one of the tech industry&#8217;s many new AI variations, but it has been met with controversy as millions of users seek to disable it.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Users have found that those who ignore the Gemini Workspace feature will be nudged with suggestions to &#8220;polish&#8221; or &#8220;help me write&#8221; email drafts.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">As useful as this can be, many users are less than enthusiastic. Financial Times gadget editor Rhodri Marsden summed up one major issue with the tech on Bluesky: &#8220;I judge my interactions with people based on *what they wrote*, rather than what Gemini thinks they want to write.&#8221;<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Users have also reported having issues turning the technology off, as the Australian Computer Society detailed.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Companies are said to be moving full force toward AI to be competitive within the tech industry, but the environmental cost should not be overlooked.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">AI-driven data centers require vast amounts of materials, with a single 4-pound computer needing 1,763 pounds of resources, and they rely on elements often mined destructively, according to the U.N. Environmental Program. Electronic waste from data centers contains hazardous substances like mercury and lead, while one study projects their water consumption \u2014 used for cooling \u2014 could soon exceed that of Denmark.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Additionally, AI technology has immense energy demands, with an AI request consuming 10 times the electricity of a Google search&#8230;<\/span><\/p><\/blockquote>\n<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.thecooldown.com\/green-business\/gemini-workspace-ai-email-assistant\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Read more at The Cool Down<\/span><\/strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><strong>.<\/strong><\/span><\/a><\/span><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.techradar.com\/pro\/security\/hidden-text-salting-is-letting-hackers-craft-devious-email-attacks-to-evade-detection\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Hidden text &#8220;salting&#8221; is letting hackers craft devious email attacks to evade detection<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Just because you can&#8217;t see certain email text, it doesn&#8217;t mean it&#8217;s not there<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Hackers are increasingly using \u201chidden text salting\u201d, or \u201cpoisoning\u201d techniques, to work around email security measures and get phishing messages to land in people\u2019s inboxes.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A new in-depth guide published by cybersecurity researchers from Cisco Talos outlines how cybercriminals are abusing HTML and CSS properties in email messages, setting the width of some elements to 0, and using the \u201cdisplay: hidden\u201d feature to hide some content from the victims. They are also inserting zero-width space (ZWSP) and zero-width non-joiner (ZWNJ) characters, and ultimately hiding the true email content, by embedding irrelevant language.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">As a result, email security solutions, spam filters, and brand name extractors get confused, and the emails that would otherwise end up in the spam folder, make it directly to the inbox.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Advanced filtering<\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In its writeup, Cisco Talos has given multiple examples, including one in which attackers hid French words in the email\u2019s body. This confused Microsoft\u2019s Exchange Online Protection (EOP) spam filter which ultimately let the message pass.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In another example, Cisco Talos said threat actors were using CSS properties and ZWSP characters to hide email content, successfully mimicking Wells Fargo, and Norton LifeLock.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">To tackle this strategy, the researchers suggested IT teams adopt advanced filtering techniques that scan the structure of HTML emails, rather than just their contents..<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.techradar.com\/pro\/security\/hidden-text-salting-is-letting-hackers-craft-devious-email-attacks-to-evade-detection\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><strong><span style=\"text-decoration: underline;\">Read more at TechRadar Pro.<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt; color: #ff0000;\"><strong><em>Thanks for reading this week&#8217;s Thursday Newbytes. We hope these articles were informative, interesting, fun, and helpful. <\/em><\/strong><\/span><\/p>\n<p><a href=\"https:\/\/thundercloud.net\/donation.htm\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/thundercloud.net\/infoave\/images\/2017\/goodfight2017.png\" alt=\"Help us help you!\" width=\"573\" height=\"136\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; New Windows 11 Update Breaks File Explorer; New Chrome Browser Attack Could Affect Billions; New Windows App Could Make Changing Computers Easy&#8230; and more! Every day, we scan the tech world for interesting news, sometimes from outside the tech world. Every Thursday, we feature news articles that grabbed our attention over the past week. We hope you\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/new-windows-11-update-breaks-file-explorer-new-chrome-browser-attack-could-affect-billions-new-windows-app-could-make-changing-computers-easy-and-more\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":29224,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4421,2574,4484,2247,2509,1426,1674,4522,4353,4221,2366],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/29841"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=29841"}],"version-history":[{"count":6,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/29841\/revisions"}],"predecessor-version":[{"id":29848,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/29841\/revisions\/29848"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/29224"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=29841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=29841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=29841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}