News, Announcements, Tech Discussions
Recently active
Another sign that a new version of Windows is on the way!Jun 14, 2021, 9:06am EDT Microsoft is ending support for Windows 10 on October 14th, 2025. It will mark just over 10 years since the operating system was first introduced. Microsoft revealed the retirement date for Windows 10 in an updated support life cycle page for the OS. Thurrott reports that this is the first time Microsoft has ever described the end of support for Windows 10.It’s not clear exactly when the support document was updated, but Thurrott reports it only previous documented “when specific Windows 10 versions would leave support,” and not the entire OS. It could be another hint that a new version of Windows is on the way.Microsoft keeps dropping Windows 11 hintsMicrosoft has been dropping lots of hints that it’s ready to launch Windows 11. The software maker is holding a special Windows event to reveal the “next generation” of the OS next week. The event starts at 11AM ET, and the event invite includes a window tha
Jun 27, 2024 12:46 EDT · Hot! 0patch, a service that provides micro security patches without disruptions, announced today that it plans to offer security patches for Windows 10 for at least five years after its official end of life, giving customers a chance to stick to their current devices without significant security compromises. In fact, analysts predict that the end of Windows 10 will trigger a wave of PC upgrades.0patch is no stranger to providing security updates for now-unsupported products. They still offer patches for Windows 7 and Server 2008, Microsoft Office products, and more. Technically, 0patch is already servicing Windows 10 (six of its discontinued versions, to be precise), but customers have the option to update to version 22H2 and receive updates from Microsoft for free. In October 2025, that privilege will be taken away, and that is when 0patch will step in.With 0patch, Windows 10 users will be getting fixes for critical security vulnerabilities discovered after Oc
Support ends next year, but Windows 10 remains the most-used version of the OS.Andrew Cunningham - 6/5/2024, 8:50 AMIn October 2025, Microsoft will stop supporting Windows 10 for most PC users, which means no more technical support and (crucially) no more security updates unless you decide to pay for them. To encourage adoption, the vast majority of new Windows development is happening in Windows 11, which will get one of its biggest updates since release sometime this fall.Further ReadingWindows 10 is back, and it’s getting Microsoft’s AI-powered Copilot assistantBut Windows 10 is casting a long shadow. It remains the most-used version of Windows by all publicly available metrics, including Statcounter (where Windows 11's growth has been largely stagnant all year) and the Steam Hardware Survey. And last November, Microsoft decided to release a fairly major batch of Windows 10 updates that introduced the Copilot chatbot and other changes to the aging operating system.That may not be th
This is a visibility repost of the original FAQ HEREThis page provides instructions on how to download your Backup & Sync data (if applicable), as well as set up your Carbonite Safe Lite backup account. If you have previously backed up data to Webroot Backup & Sync that you wish to retrieve, and have not already done so, you must do so by July 30, 2023. After this time, the data will no longer be accessible. Download Files From Your Backup and Sync Account Using any device with an Internet connection, you can download files residing in your Anywhere folder, a sync folder, or the Backup folder. For example, if you are traveling and need access to a file, simply login to your SecureAnywhere account and download the file. You can download a single file or a group of files as a Zip archive, as described below.This topic contains the following procedures:Downloading Single Files Downloading Large or Multiple Files or FoldersTo download a single file:From the left panel, select the f
UPDATE: A NEWER VERSION V7.3 HAS BEEN RELEASED OCTOBER 2023New download is available herePlease see details here The following FAQ provides information on migrating from the previous Webroot Mobile Security applications to the V6 Webroot Mobile Security application. We have since released v7.0 available herePlease see the full FAQ here The new Webroot Mobile Security offers a powerful application that provides malware detection and web-surfing security. Once installed, your Android will have the defense of an industry-leading cyber resilience company. Mobile Security will scan your device and mitigate threats. While shopping and banking online, Webroot keeps your identity and data safe by blocking phishing sites, spam sites, malware sites, and other malicious activities. Why do I need to upgrade to the new Webroot Mobile Security App?Due to evolving Google technical policies, we can no longer enhance the previous app’s features or functionalities. To assist with the migration proc
How many of you know your STAR WARS trivia and think you can turn it into Prizes?This could be youWe’re going to have ORIGINAL TRILOGY STAR WARS trivia being hosted on Google Meetups. I will be sharing my screen of the trivia interface. You can use your phone or another screen to join in.We’re going to be giving away some amazing prizes like backpacks, YETI tumblers, Han Solo carbonite icecube trays! You don’t even have to do well to win - random prizes will be given for just attending! Make sure to show up or you don’t get anything You don’t want this to be you
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages. Andromeda Nanobot Adwind
Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.Below are some of the known spyware variants: KEYMARBLE RANCOR Vermin HeroRAT InvisiMole SocketPlayer Joker
A Worm’s purpose is to propagate and spread as much as it can because it’s usually designed to find a specific environment as its target. It differs from a virus in that it doesn’t need a host file to infect and spread. Once the worm reaches its target environment it has limitless options of the end goal from the attacker, like deleting files or delivering other malware payloads like ransomware. Ransomware combined with worms using exploits was made famous with the WannaCry and NotPetya attacks in 2017 that caused over $5 Billion in damage. Below are some of the known worm variants: Brambul
Trojans are installed generally without a user’s full, meaningful, and informed consent. A Trojan differs from most malware as the payload (or the behavior) of a Trojan can be controlled potentially from a remote site. Trojan Dropper: A file that contains at least one additional, malicious file. For a file to be a Trojan Dropper and not solely a “dropper” its payload must be comprised of multiple, unrelated spies (multiple, unrelated spies indicate that this is a custom, affiliate installer). A Trojan Dropper may be an executable that contains multiple files. When the Trojan Dropper executes, the files inside the .exe are installed. A Trojan Dropper may also be a .chm (Windows Help File). Since a .chm is really a Windows proprietary compressor, it may contain multiple, malicious bundles inside the .chm, which the Trojan Dropper installs when the user exec Trojan Downloader: After installation, the Trojan contacts a remote host/site and installs packages or affiliates from the remote
The world of cryptocurrency is in its infancy stages, but criminals have been using it for years and proving the utility and anonymity of blockchain technology. Not to mention the spike in interest and speculative price on the technology has really put a focus for criminals to accumulate as much as possible. The ledger system required for blockchain tech requires mining as a fundamental. Criminals have found ways to leverage victims computers to be part of the mining operation. Victims computers will have their CPU stolen in order to mine the cryptocurrency to which the criminals will be directly rewarded without having to deal with victims for any payment scheme. It’s now grown so popular with the profitability along with minimal illegal footprint, that its one of top threats in the landscape today. Below are some of the known cryptominer variants: PowerGhost ZombieBoy msHelper WinstarNssmMiner ADB.Miner PyRoMinelot
Quite possibly the most devastating malware for victims and most profitable for criminals. This type of malware aims to block access to your data by either encrypting your files or the entire hard drive. To get your data back, victims are forced pay the criminals ransom to get their files back. Historically, ransom payments to cybercriminals was through Ukash and Moneypak, but with the emergence of cryptocurrency and the anonymity and versatility it offers, crypto is now the only payment criminals will take. There is no guarantee that victims will get their files back, but for the most part criminals do decrypt the files or else no one would pay the ransom. This is one of the most popular payloads of choice for criminals and it’s been featured in just about every type of attack vector like email attachments, exploit kits, browser extensions, office macros, Remote Desktop Protocol (RDP), ect. If a cybercriminal has breached your system the most likely end result will be ransomware. F