VPN networks are becoming an increasingly popular solution among companies and private clients. Many people connect to the Internet using the “Virtual Private Network”, because it allows us to hide our identity and thus increase security on the Internet. What are the other features of the VPN? What are its pros and cons?
Another vulnerability in the vulnerable like Swiss cheese security processors from Intel. Bitdefender researchers have found another weak spot in blue chips that allowed attack on all computers equipped with Ivy Bridge and newer processors. Fortunately, the problem was solved with one of the last patches for Windows, but the whole thing does not put Bob Swan in the best light.
Monthly patches available.
Every second Tuesday of the month is the day Microsoft releases update packages for Windows 10. Patches as part of Patch Tuesday should be available on all computers with Windows 10 in 1903, 1803, 1709, 1703, 1607 and 1507.
What’s new in the KB4512508 update for the latest build? For computers with Windows May 2019 Update, mainly changes related to security patches – they are invisible to users.
In developed countries, there is rarely a situation where, for example, Google Maps does not have a road marked. It is different in the case of African countries or Thailand, where the terrain is not very well mapped and navigation using various applications turns out to be simply unreliable. Facebook comes in handy.
Many people around the world wiped their eyes in amazement when, after updating the McAfee Endpoint Security 10.2 anti-virus software database, they could not log into their Windows system. The patch for McAfee at the beginning of the week, marked with number 9418, was especially effective in companies whose employees thought they had fallen victim to ransomware.
North Korean cyberspace experts have stolen $ 2 billion. The money thus obtained was allocated to the development of programs related to weapons of mass destruction.
A panel of experts monitoring compliance with UN sanctions by North Korea has prepared a confidential report on this subject. According to Reuters, which gained access to the document, Korean hackers carried out cyber attacks on behalf of the General Scout Office. It is the most important military intelligence agency in the DPRK. Criminals’ activities targeted financial institutions and cryptocurrency exchanges. Money laundering also took place in cyberspace.
Probably many of you using the Internet have certainly heard the term “IP address” together with a combination of four numbers separated by periods. What for some internet and IT enthusiasts is a standard and as obvious as e.g. the area code for Berlin, for others it is still an unknown concept, which may require a broader explanation. What’s more, only a small group know that with the help of certain technological facilities we can manipulate this address (on: we can change it as we like).