By continuing to use the site or forum, you agree to the use of cookies, find out more by reading our GDPR policy

According to a Wall Street Journal report, the U.S. government officials are claiming Huawei, a phone and telecommunications company with ties to the Chinese government, has the ability to spy on users of mobile phone networks employing Huawei equipment. The claim comes after years of accusations from the U.S. government and repeated denials from Huawei. While Huawei is one of the largest sellers of phones in the world, its original business was building telecommunication networks. However, the U.S. has been wary of allowing Huawei equipment to be incorporated into U.S. telecommunications networks. A 2012 Congressional report effectively banned Huawei from selling the equipment and strongly discouraged U.S. phone companies from selling Huawei phones in their stores. The U.S. wariness comes from concerns regarding Huawei’s ties to the Chinese government—its founder is former Chinese military—and good old-fashioned protectionism. The company has been well positioned provided equipment for the roll-out of affordable and fast 5G networks. “There is no question in my mind that the extra scrutiny Huawei has been under as of late has to do with the political environment between China and the U.S. as well as the high-stakes around AI and 5G,” Lynette Ong, associate professor of Political Science at the University of Toronto, told me via email last year. Ong specializes in Chinese politics and political economy. Last year the U.S. and Huawei traded barbs over the U.S.’s concerns and Huawei’s alleged spying, fraud, and violation of international sanctions against Iran. The furor led to both Australia and New Zealand banning the use of Huawei equipment in telecommunication networks. However some of the largest telecommunication networks in the world, including ones owned by U.K. based Vodafone, and the German Deutsche Telekom AG, currently incorporate Huawei equipment. U.S. officials now claim Huawei has included backdoors into the equipment that effectively allows it to access the same data law enforcement can access. Typically these backdoors, known as “lawful interception interfaces” are used exclusively by law enforcement who must provide warrants to gain access. The equivalent of the old school wiretap, these lawful interception interfaces gives the user of the interface access to any data transmitted over the network, including phone calls and text messages. Looking for more, visit OUR FORUM.

At least four more major participants pulled out of MWC 2020 over the weekend, while restrictions on visitors from China have been tightened. Amazon, Nvidia, Sony, and Viavi have now all confirmed they’ve decided the risk of coronavirus infection is too great for them to allow their formal presence to go ahead. Here are their statements. Amazon: “Due to the outbreak and continued concerns about novel coronavirus, Amazon will withdraw from exhibiting and participating in Mobile World Congress 2020, scheduled for Feb. 24-27 in Barcelona, Spain.” Nvidia: “We’ve informed GSMA, the organizers of MWC Barcelona, that we won’t be sending our employees to this year’s event. Given public health risks around the coronavirus, ensuring the safety of our colleagues, partners, and customers is our highest concern. “MWC Barcelona is one of the world’s most important technology conferences. We’ve been looking forward to sharing our work in AI, 5G, and vRAN with the industry. We regret not attending, but I believe this is the right decision. We’re grateful for GSMA’s leadership and continued efforts to ensure the safety of all attendees.” Sony: “Sony has been closely monitoring the evolving situation following the novel coronavirus outbreak, which was declared a global emergency by the World Health Organization on January 30th, 2020. As we place the utmost importance on the safety and wellbeing of our customers, partners, media, and employees, we have taken the difficult decision to withdraw from exhibiting and participating at MWC 2020 in Barcelona, Spain. “The Sony press conference will now instead take place at the scheduled time of 8:30 am (CET) on February 24, 2020, as a video via our official Xperia YouTube channel to share our exciting product news. Sony would like to thank everyone for their understanding and ongoing support during these challenging times.” Viavi: “After reviewing all available data, VIAVI has chosen to cancel participation in this year’s Mobile World Congress in Barcelona out of an abundance of caution and concern for our employees, customers, and partners.” There are rumors of other cancellations, but none confirmed at the time of writing. Cnet reports that Samsung is still exhibiting, but is acting to protect just its senior execs, which isn’t a great look if it’s true. We asked Samsung for comment and were told that, while there is no official statement, the company is still attending. Keep up to date by visiting OUR FORUM often.

Updating your devices to the latest version of Windows 10 only to discover that your sound and WiFi has stopped working is nothing short of a nightmare. Unfortunately, Windows 10’s monthly updates have been consistently running into such problems and Microsoft’s operating system hasn’t been in a positive light lately. Windows 10 KB4532695 is the latest update that many users installed in a bid to fix File Explorer’s broken search bar, but it reportedly includes a whole raft of other flaws. The problematic update, which was released in late January, is now breaking down even more PCs and causing performance issues. Initially, it appeared that Blue Screen of Death (BSOD) is only hitting a small set of computers, but the problem appears to be widespread now. Several users in our comment section and Microsoft’s forum are pointing the blame at KB4532695 for a Blue Screen of Death (complete crash of the PC) with a critical error message and different stop codes. Users are now also reporting a complete boot failure and significant performance slowdown, which suggests that there are some very nasty gremlins in the works. “Had this exact issue with my PC. Was causing absolute havoc. Couldn’t access the BIOS, couldn’t even get it to install a fresh install of Windows as the system locked and would get stuck in a boot cycle. By some miracle, it booted up randomly on its literal millionth attempt and I restored back to before the update. Hey presto, problem solved,” one user wrote in our comment section. If you have a computer with Sound Blaster (sound cards), installing January optional update could disable it, according to multiple reports. “Soundblaster was working fine and after installing this update is not working anymore. The sound is passing through the motherboard drive (Realtek) instead of Soundblaster. Managed to fix it by setting the sound under Realtek… but Soundblaster is basically useless,” a user said. Some Windows 10 owners with other sound cards are also experiencing audio issues, so it’s possible that the update is not compatible with certain versions of adapters. And there are complaints that Windows 10 KB4532695 fails to install with generic error messages. According to a system administrator, Windows 10 may have lost track of where .NET are installed and disabling the feature before installing the patch resolves the installation problems. Follow this on OUR FORUM.

It’s not every day that an operating system retires. Windows 7 reaching end of support status on January 14 has been very much the biggest news story in technology this year. The deadline had users finally saying goodbye to the classic OS and upgrading to Windows 10, companies rushing out to buy new hardware, and people speaking their minds about how they felt about leaving their favorite platform behind — Windows 7 was even trending on social media! But perhaps the most surprising voices are the ones demanding Microsoft to open-source Windows 7 and release the OS as free software, allowing the community to maintain it. With one of the most popular versions of Windows has reached the end of life, it is only logical that users have a strong attachment to it. After all, Windows 7 still works perfectly fine on older hardware and has that near perfect balance of performance, features and looks that these users require. This very much is the opinion of the Free Software Foundation. Founded by Richard Stallman in 1985, FSF has a history of agitating against Microsoft and its use of proprietary software licenses. In fact, at the launch of Windows 7, the organization urged customers to ditch the OS and hop onto free operating systems. They even started this controversial campaign called Windows 7 Sins. It accused the company of poisoning education, invading privacy, monopolistic behavior, vendor lock-in, abusing standards, enforcing DRM and even threatening user security. Stallman retired from FSF last year, but the organization continues to fault the Redmond based technology giant of way too many wrongdoings with Windows 7. Now, on the eve of the Windows 7 retirement, the organization is back, saying there is a chance for Microsoft to make amends. The FSF gang wants to persuade Microsoft to make Windows 7 open source for the community. It asks for Microsoft to open source Windows 7 under a free license like the GNU Public License (GPL), which Stallman created. This, they say, will enable the community to study and improve the operating system, and keep it updated with new features and security fixes. They point out that the company has nothing to lose if they release the source code of the operating system as it has reached the end of life. The campaign set a modest goal of 7,777 signatures, which it whizzed by really, really quick. As of this writing, more than twelve thousand people have signed it, even as we have no official response from Microsoft.Even with Microsoft embracing open source and Linux recently, releasing the source code of something as complex as Windows 7 borders on the impossible at least in the medium term. This may change in the future, but the company is unlikely to cave in to these demands now. There is so much more posted on OUR FORUM.

Microsoft is currently working on new features designed to block malicious content in Office 365 regardless of the custom configurations set up by administrators or users unless manually overridden. This change was prompted by the fact that some settings allow for Office 365 Exchange Online Protection/Advanced Threat Protection detonation verdicts to be bypassed and inadvertently allow malicious content to reach the customers' inboxes. Once the new features will be enabled, Office 365 will automatically honor EOP/ATP detonation — malware analysis — verdicts to block known malicious files and URLs regardless of custom configurations. The domain allows and transport rules are the ones most commonly responsible for content flagged by Office 365 EoP or ATP as malicious still being delivered to the end-users. "We’re updating our filters to ensure that malicious files and URLs are not delivered regardless of configuration unless manually overridden," says the features' entry on the Microsoft 365 Roadmap. The "Office 365 ATP, Secure by Default" update is currently under active development according to the roadmap and comes with an estimated release date set for February 2020, to be generally available in all environments. Microsoft previously warned Office 365 admins and users against bypassing the built-in spam filters in June 2019, as part of a support document that also provides guidelines for cases when this can't be avoided. As Redmond says, Office 365 end-users should avoid enabling Allow or Block lists within the Spam Filter policies, as well as skipping Transport Rules scanning. Microsoft also urges Outlook or Outlook on the Web users and admins not to toggle on Safe and Blocked senders. "We recommend that you do not use these features because they may override the verdict that is set by Office 365 spam filters," says Microsoft. Microsoft recommends Office 365 customers to report junk email messages using the Microsoft Junk Email Reporting Add-in "to help reduce the number and effect of future junk email messages," while Outlook users can employ the Report Message add-in to report junk email. "If you have to set bypassing, you should do this carefully because Microsoft will honor your configuration request and potentially let harmful messages pass through," the support document says. "Additionally, bypassing should be done only on a temporary basis. This is because spam filters can evolve, and verdicts could improve over time." Further details can be found on OUR FORUM.

It may be tempting to try to download the latest games or applications for free, but doing so will ultimately land you in a hotbed of trouble as your computer becomes infected with adware, ransomware, and password-stealing Trojans. Tools that allow you to crack, or bypass license restrictions, in copyrighted software have been around forever and users have always known that they face the risk of being infected with unwanted software by using them. In the past, though, most of the unwanted programs that were installed were adware or browser extensions, and though definitely a nuisance, for the most part, they were not stealing your files or installing ransomware on your computer. This has changed as software installer monetization companies have started to increasingly team up with ransomware and password-stealing Trojan developers to distribute their malware. Passwords stolen through software cracks BleepingComputer has been tracking adware bundles for a long time and in the past, they would install unwanted programs, but had no long-term ramifications to your data, privacy, or financial information. Security researcher Benkøw has recently noticed that monetized installers pretending to be software cracks and key generators are now commonly installing password-stealing Trojans or remote access Trojans (RATs) when they are executed. In his tests over the past week by downloading various programs promoted as game cheats, software key generators, and licensed software, when installing them he was infected with password-stealing Trojans and backdoors such as Dreambot, Glupteba, and Racoon Stealer. In BleepingComputer's tests, we were infected with ShadowTechRAT, which would allow an attacker to gain full access to an infected computer. It is not only RATs and password-stealing Trojans that users could be infected with. One of the most prolific ransomware infections called STOP is known to be installed through these same adware bundles. Distributed via torrent sites, YouTube, and fake crack sites. To distribute these adware bundles, attackers will upload them to torrent sites, create fake YouTube videos with links to alleged license key generators, or create sites designed to just promote adware bundles disguised as software cracks. On torrent sites, you will commonly find that the same user has uploaded many different games, applications, and key generators that all have the same size.  For example, in the image below you can see a user named 'toneg374' had uploaded many torrents around the same time that all have the size of 25.33 MB. For more visit OUR FORUM.

 

Translate