MosaicRegressor: An UEFI malware

[German]Security researchers from Kaspersky have discovered malicious code in the UEFI installed on the motherboard of devices at customer sites. The malicious code was part of a larger malware framework called Kaspersky MosaicRegressor

Continue reading

Posted in devices, Security | Tagged , , | Leave a comment

Security: Microsoft Digital Defense Report, Exploit Author Fingerprint

[German]I'll summarize two security topics in this blog post. Microsoft has presented the Digital Defense Report. And there is an approach to hunt for exploits by searching for the author's fingerprints.

Continue reading

Posted in Security | Tagged | Leave a comment

Windows 10: Has Telnet been removed as a feature?

[German]Strange observation of a blog-reader, which I will discuss here. It's about the telnet function, which can be installed as an optional feature. The program was suddenly gone and could only be found as a copy in a cache. Here are some details about what it is all about.

Continue reading

Posted in issue, Windows | Tagged | 1 Comment

Thunderbird 68.12.1 released

[English]Another short addendum from last week. The developers of the e-mail client Thunderbird released version 68.12.1 of the e-mail client on October 1, 2020. This is a maintenance update for the 68 main version of the e-mail client, which was offered to me today.

Continue reading

Posted in Software, Update | Tagged , , | 2 Comments

Windows 10: Disable Bing in the search

[German]If you are annoyed by the Bing search in the Windows 10 start menu search, you can turn it off. For this purpose a registry key is available, which can be set via group policy or directly as an entry. Here are a few hints and a look at the facts and some explanation, why many internet tutorials don't always work.

Continue reading

Posted in Windows | Tagged , , | 4 Comments

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Office: Instabilities/crashes due to C2R and MSI parallel installation?

[German]A short note for administrators who try to run Office modules in their environment both as Click-n-Run and MSI installations. This can lead to unstable Office installations, as I just learned from feedback from blog readers.

Continue reading

Posted in issue, Office | Tagged , | Leave a comment

Virtualization: New Office versions as performance killers

[German]What about the performance of new versions of Microsoft Office? Every new version has a bigger foot print and feels more sluggish. I have just seen an interesting evaluation of VMware for Office in virtual desktop infrastructure (VDI) environments that confirms this impression and I would like to share it with you.

Continue reading

Posted in Office, Virtualization | Tagged , , | 1 Comment

Security patches for Cisco IOS XR (Sept. 28, 2020)

[German]Cisco has already released critical security updates for its network operating system IOS XR on September 29, 2020. The updates close two vulnerabilities in the products that are classified as critical. It should therefore be patched as soon as possible.

Continue reading

Posted in Security | Tagged | Leave a comment

Microsoft Defender Package for Windows Install-image Updates

[German]Microsoft has released a PowerShell script package that allows installation images of Windows 10 and Windows Server to already have an updated Microsoft Defender. This should reduce the vulnerability of a new installation.

Continue reading

Posted in Windows | Tagged , , | Leave a comment

Free check: Has your Email been abused in Emotet attacks?

[German]The Emotet malware is distributed via spam email campaigns. A free service now makes it possible to check whether an email address has already been abused in such a campaign.

Continue reading

Posted in Security | Tagged , | Leave a comment