Author Archives: Web Master

Office 365 now opens attachments in a sandbox to prevent infections

Office 365 now opens attachments in a sandbox to prevent infections

Microsoft today announced the launch of Application Guard for Office in public preview to protect enterprise users from threats using malicious attachments as an attack vector. Application Guard for Office (also known as Microsoft Defender Application Guard for Office) is designed to help prevent block files downloaded from untrusted sources from gaining access trusted resources by opening them within an isolated sandbox. […]

Read More »
Microsoft confirms Internet Explorer is finally dead on Windows 10

Microsoft confirms Internet Explorer is finally dead on Windows 10

MICROSOFT has hammered the final nail into Internet Explorer’s coffin, forcing Windows 10 users to move to its recently redesigned Microsoft Edge web browser, or rivals like Google Chrome, Opera and Mozilla Firefox. Here’s when you’ll lose the IE from your PC. Microsoft has confirmed plans to phase out its once-ubiquitous Internet Explorer web browser […]

Read More »
SAP updates security note for critical RECON vulnerability

SAP updates security note for critical RECON vulnerability

SAP today released its security patches for August, alerting of new critical and high-severity vulnerabilities in several of its products, mostly NetWeaver Application Server (AS). The full list includes 16 advisories, almost half of them being for bugs that SAP customers should prioritize patching. SAP has also updated its security note for the maximum severity RECON […]

Read More »
Office 365 will let you manage phishing simulation emails

Office 365 will let you manage phishing simulation emails

Microsoft is adding support for allowing emails containing malicious URLs or attachments to reach the mailboxes of end-users to make it easier to run phishing training sessions or simulations. This will be done via a self-remediation portal by enabling Office 365 security administrators to choose items that could contain threats and to allow them to reach the […]

Read More »
How to restore Windows Photo Viewer in Windows 10

How to restore Windows Photo Viewer in Windows 10

Starting with Windows 10, when you open an image file, the image would no longer be viewed in the Windows Photo Viewer. Instead, you’ll be switched to the new Microsoft Photos, which is plagued with performance and reliability issues. While Windows Photo Viewer has been retired, it is still easy to use and lightweight program to […]

Read More »
Microsoft now lets you run Android apps in Windows 10

Microsoft now lets you run Android apps in Windows 10

Microsoft has announced a new feature that allows Windows 10 users running Insider builds to launch their Android apps directly in Windows 10. This feature is only supported on select Samsung Galaxy devices and allows Android to stream apps to your Windows 10 devices. o use this feature, Samsung Galaxy users must first link their […]

Read More »
Zoom bug allowed attackers to crack private meeting passwords

Zoom bug allowed attackers to crack private meeting passwords

A lack of rate limiting on repeated password attempts allowed potential attackers to crack the numeric passcode used to secure Zoom private meetings as discovered by Tom Anthony, VP Product at SearchPilot. “Zoom meetings are (were) default protected by a 6 digit numeric password, meaning 1 million maximum passwords,” as Anthony discovered. The vulnerability he […]

Read More »
UK businsesses still not supporting remote working

UK businsesses still not supporting remote working

The coronavirus outbreak is being dubbed by some as the world’s largest work-from-home experiment. However, according to research conducted by VoIP provider 8×8, many businesses aren’t supportive of the practice. Polling 1,000 UK employees, 8×8 found 41 percent of companies don’t have remote working policies in place and a quarter (26 percent) of respondents said […]

Read More »
New supercomputers look to uncover mysteries of the universe

New supercomputers look to uncover mysteries of the universe

Simulating how a galaxy is formed, or how a black hole gets created takes a lot of computational power. That’s why The Flatiron Institute, located in New York City, decided to partner up with Lenovo and Intel, in order to create an advanced machine capable of running such simulations. “Science should dominate our researchers’ time, […]

Read More »
5G could end up posing a major security risk

5G could end up posing a major security risk

Software issues, as well as vendor lock-in, are potential cybersecurity weak spots for telecommunications companies all over the world looking to integrate 5G, according to a new European report. The European Commission and the European Agency for Cybersecurity issued a report earlier this week, which argues that, for 5G to work, telecommunications companies will increasingly […]

Read More »