Tag Archive for: What’s

What’s new and improved in Windows 11 22H2, coming soon


Windows 11

Windows 11 version 22H2 aka Sun Valley 2 is set to launch later this year. Unlike the original Windows 11 release, it won’t be a massive update with radical design changes.

Instead, Sun Valley 2 will be similar to Windows 10 Anniversary Update, so you can expect minor improvements and a few new features.

The version 22H2 will contain a number of improvements and it will be offered as a full feature update rather than an enablement package.

Start Menu improvements

Microsoft is testing a new feature that will allow you to pin more apps or activities in the recommendations section of the Start Menu.

Additionally, you can soon force the Start Menu recommendations tab to open files in Office web only if your device doesn’t come with full desktop apps.

There’s a possibility that Start Menu features will be released using ‘Windows Feature Experience Packs,’ which is a new way to update and improve the OS without major feature updates.

Taskbar

Microsoft is restoring the drag and drop capability. This means you can finally drag your files onto apps pinned to the taskbar. Or you can also drag apps to the taskbar to create shortcuts.

Task Manager

22H2 will refresh Task Manager with a new design based on Fluent UI and WinUI. 

New hero element in Windows Task Manager

Like the current version of Task Manager, the new version can also display the same set of screens, such as Processes, Performance, App history, Startup apps, Users, Details, and services. However, there are a few noticeable changes.

As you can see in the below screenshots, Task Manager will now use a new sidebar or hamburger menu to display processes and performance options. This would make the Task Manager easily accessible on touchscreen devices.

Task Manager

Additionally, Task Manager’s top bar now displays the brand and name of the device, its model (if available), a picture of the device, and CPU or RAM being used.

New flyout design

Microsoft is refreshing the design for the hardware indicators like sound and brightness.

Media controls that appear on the Lock screen when playing music in a supported app are also getting a new look.

Media Flyout

The updated flyout matches the design shown for the media controls across the operating system and Microsoft’s vision for…

Source…

What’s next for Jeffrey Katzenberg?


A year ago Jeffrey Katzenberg was seeing stars—and not quite like he’s used to.The well-known Hollywood power broker took a blow to the chin with the sale of Quibi, the short-form mobile media company he founded in 2018. The service shuttered after just six months of operation and didn’t quite spark the video revolution that he and CEO Meg Whitman had hoped. Today its remnants reside with Roku.

What do you do when you’re knocked down? Get back up, of course. Katzenberg regrouped with WndrCo, his well-funded investment company that birthed Quibi, and got back to business investing in others’ companies. Among his latest ventures is a digital security company called Aura, led by founder and CEO Hari Ravichandran. Morning Brew spoke to both of them.

We’ve come a long way since Hackers. Why do we need to care about computer security in 2022?

Katzenberg: We’ve spent a good amount of time and money to secure our physical stuff. These are the front doors of our lives, and we’ve secured them with Ring doorbells and the like. But we’ve left the back doors open. Criminals want to go after the assets on your mobile device and it’s low risk and high reward.

So you invest in a digital security company called Aura, now valued at $2.5 billion. Tell me how it works.

Ravichandran: You buy a subscription at Aura.com. It makes sure your identity is protected, alerts you if your data is in the dark web, alerts you of transaction data, antivirus. If you’re at Starbucks on an open network, it will secure that using a VPN. And there are a lot more features to come. It’s a continuously evolving problem. Our mission is to create a safer internet.

My understanding is that corporate coffers are far more attractive than the personal accounts of the Average Jane or Joe who isn’t a celebrity or CEO.

Katzenberg: Oh, I disagree. The complexity of going after an enterprise, with all of the protections built into those systems and the resources behind them? The consumer has no idea what they need and how to protect themselves. It’s not that there are no solutions, it’s that there are so many of them. In today’s digital environment, I’ve given up my privacy but not the protection of my…

Source…

What is latest internet threat Log4j? How bad it is and what’s at stake, Telecom News, ET Telecom


Log4Shell, an internet vulnerability that affects millions of computers, involves an obscure but nearly ubiquitous piece of software, Log4j. The software is used to record all manner of activities that go on under the hood in a wide range of computer systems.

Jen Easterly, director of the U.S. Cybersecurity & Infrastructure Security Agency, called Log4Shell the most serious vulnerability she’s seen in her career. There have already been hundreds of thousands, perhaps millions, of attempts to exploit the vulnerability.

So what is this humble piece of internet infrastructure, how can hackers exploit it and what kind of mayhem could ensue?

What does Log4j do?
Log4j records events – errors and routine system operations – and communicates diagnostic messages about them to system administrators and users. It’s open-source software provided by the Apache Software Foundation.

A common example of Log4j at work is when you type in or click on a bad web link and get a 404 error message. The web server running the domain of the web link you tried to get to tells you that there’s no such webpage. It also records that event in a log for the server’s system administrators using Log4j.

Similar diagnostic messages are used throughout software applications. For example, in the online game Minecraft, Log4j is used by the server to log activity like total memory used and user commands typed into the console.

How does Log4Shell work?
Log4Shell works by abusing a feature in Log4j that allows users to specify custom code for formatting a log message. This feature allows Log4j to, for example, log not only the username associated with each attempt to log in to the server but also the person’s real name, if a separate server holds a directory linking user names and real names. To do so, the Log4j server has to communicate with the server holding the real names.

Unfortunately, this kind of code can be used for more than just formatting log messages. Log4j allows third-party servers to submit software code that can perform all kinds of actions on the targeted computer. This opens the door for nefarious activities such as stealing sensitive information, taking control of the targeted system and slipping malicious…

Source…

What’s your risk if your Broward school data was breached?


“In my personal opinion, within 72 hours, you’re obligated to tell them, ethically speaking,” said Chester Wisniewski, principal research scientist for Sophos, a global cyber-security company that monitors ransomware threats. “It’s not a law or a rule,” he said, “[but] waiting months is very bad. It’s just more time you’re not being able to fight against your data being abused.”

Source…