Bing/Edge directed Chrome-Fans to Phishing sites

[German]A worrying thing that may have happened in the USA. Users looking for a Google Chrome download in Microsoft Edge on Windows 10 were occasionally redirected to a page offering unwanted software (PUP).

Continue reading

Posted in browser, Security, Windows | Tagged , , | Leave a comment

Linux: Vulnerability CVE-2018-15688 in Systemd

[German]A vulnerability in the systemd component of some Linux distributions can be exploited over the network. A single DHCPv6 package is enough to provoke a crash or more.

Continue reading

Posted in Linux, Security | Tagged , | Leave a comment

Lenovo ThinkPad: UEFI settings bricks devices

[German]Owners of current Lenovo ThinkPad models who changes some UEFI/BIOS settings run the risk of breaking their devices. Here is some information.

Continue reading

Posted in devices, issue | Tagged , | Leave a comment

IBM acquires Red Hat

IBM acquires Linux vendor Red Hat and will integrate Red Hat as a unit into its hybrid cloud division. Red Hat CEO Jim Whitehurst joins IBM's senior management team and reports to IBM CEO Ginni Rometty. The deal is worth $43 billion. That's the message of today's Sunday (here's the information from Red Hat, and here's a CNBC article on the subject).

Posted in General | Tagged | Leave a comment

Surface Pro 3: Vulnerability in TPM chip–update required!

[German]Microsoft have been used TPM chips from Infineon in Surface Pro 3. These chips probably contain vulnerabilities in some versions. Affected owners of a Surface Pro 3 should therefore install an TPM update. 

Continue reading

Posted in devices, Security | Tagged , | Leave a comment

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Windows Defender in a sandbox

Microsoft has added an additional security feature to the Windows Defender included in Windows 10. Defender can be run in a protected sandbox environment from Windows 10 V1703 onwards.

Continue reading

Posted in Security, Windows | Tagged , , | Leave a comment

Tor Browser 8.0.3

On October 23, 2018, the developers released Tor Browser 8.0.3. This is a maintenance update that includes Firefox to 60.3.0esr and an updated Tor button. The Tor bundle supports anonymous surfing on the Internet.

Continue reading

Posted in browser | Tagged | Leave a comment

Windows 10 Mobile: Bootloader unlocker is Open Source

A brief information for for people who still have Windows 10 Mobile devices and use them for handicrafts. René Lergner has released his bootloader unlocker code as Open Source.

Continue reading

Posted in devices, Windows | Tagged , | Leave a comment

Windows 7: CBS.log bug can fill your system drive

win7[German]In Windows 7 (and other versions) there is a CBS.log bug that Microsoft should have known about for years. A Windows component writes data to a log file, which can become very large as a result. However, a function to compress the log file fails if this file becomes too large. Then the system drive will be filled with trash data.

Continue reading

Posted in issue, Windows | Tagged , | 3 Comments

Win 10: Bug in UWP API enables access to user data/file

[German]There is discussion that a design flaw (a bug) within the Universal Windows Platform API allows UWP app developers to access arbitrary user data. In Windows 10 V1809, Microsoft has tried to mitigate the bug – but then UWP apps crash.

Continue reading

Posted in issue, Security, Windows | 2 Comments