Cyber Command Says Chip Shortage is a National Security Issue The head of U.S. Cyber Command, General Paul Nakasone, told Congress that China’s continued progress towards domestic chip production is a problem. If China achieves chip independence, that puts them in a position to do what they want and not worry about sanctions. For example, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Software released by Microsoft and other vendors is digitally signed so that users can validate that it really came from the vendor in question and that it has not been modified since the vendor created it. However, hackers have figured out how to bypass the security provided by Microsoft’s digital signature verification process, allowing them […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Microsoft Investigating Multiple Windows 11 Issues While some of the issues are not fatal, others like a memory leak in File Manager that can only be recovered from by rebooting are more of a problem. I recommend waiting for a month or two in order for other users to detect more bugs. Credit: Bleeping Computer […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Microsoft did learn something from Windows 10 – don’t mess with their cash cow. They will continue to work on Windows 10 for the enterprise with a new release in the fall and cumulative updates for years. But for consumers eager for the next new shiny object – Windows 11, here we come. For early […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The media continues to report on the Microsoft Exchange hack, likely perpetrated by China. Reports are that at least 30,000 Exchange servers in the United States are impacted and some people say that number is likely way underestimated. On top of that, the number of servers worldwide is maybe ten times that number. Given all […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Happy New Year. May 2021 be more sane than 2020. Microsoft Says Goal of Solar Winds Attack Was Your Cloud Data Microsoft says that the objective of the Solar Winds Hackers was to get into a number of organizations and then pick and choose which ones to attack, leaving the back door in place at […]
Continue reading →
[DISPLAY_ACURAX_ICONS]