Microsoft Edge can silently send search queries, demographics, and other data to Microsoft servers. Moreover, not only search data in Bing, but also search data in Google, DuckDuckGo,
StartPage and other search engines.
Welcome to my little corner of the internet, where I've gathered all the nifty IT stuff that I find super interesting and useful. You will see my System Administrator notes, tips, and tools that I use based on my experience. These resources help me tackle tech issues with ease and boost my productivity. I truly hope you find these materials as valuable as I do. And hey, thanks for dropping by my little IT sanctuary. Alexander Reydman
Friday, October 6, 2023
HOW TO DISABLE THE SEND YOUR SEARCH HISTORY FEATURE IN MICROSOFT EDGE
Wednesday, September 20, 2023
Now even a light bulb can steal your Wi-Fi password.
Recently, vulnerabilities were discovered in TP-Link Tapo L530E smart bulbs and the TP-Link Tapo application. These vulnerabilities can pave the way for any malicious actor to access Wi-Fi credentials.
The vulnerabilities are related to unreliable authentication and a lack of random elements in symmetric encryption.
With the help of these vulnerabilities, a malicious actor can obtain the Wi-Fi credentials of the victim's network and control all devices connected to that network.
Until the vulnerabilities are fixed, I recommend not using these light bulbs and their associated application.
Source: AntiHaker Blog
Monday, September 18, 2023
Unlock / Delete File or Folder, Locked by a System or Applications
Choose the right tools
Tested, works
https://emcosoftware.com/unlock-it
Wednesday, September 13, 2023
Reconciling the DHCP Database
When inconsistencies in the DHCP database are detected, reconciliation of data across all scopes can resolve the problem. Lease information is stored in the database in two forms: detailed and summary. During reconciliation, these details are compared for contradiction. If found, the DHCP server either reverts the addresses in question to the original owners or creates temporary reservations for them, valid for the assigned lease time.
Access the DHCP console and select the relevant server from the console tree to perform reconciliation.
On the 'Action' menu, click 'Reconcile All Scopes', then 'Verify'.
Any inconsistencies are reported and can be fixed by clicking 'Reconcile'.
If the database is found to be consistent, click OK.
To perform this process for an individual scope, click the applicable scope in the console tree, and from 'Actions', click 'Reconcile', and then 'Verify'. Any inconsistencies detected can be corrected by selecting the discrepancies and clicking 'Reconcile'.
Monday, September 11, 2023
AI helps to prevent accidental data exposure
Hornetsecurity releases 365 Total Protection Plan 4 for Microsoft 365 with AI Recipient Validation that prevents misdirected emails.
AI Recipient Validation is one of 365 Total Protection’s newest features, providing security and compliance managers with true visibility into how often employees are exposed to potentially misdirected emails and how they respond to them. It protects the end user by providing a warning when an email they are about to send appears to be misguided or contain sensitive information. The user can decide to either adjust their email or continue to send without modification.
Additionally, this new AI-based service continuously updates its understanding of the user’s email communication patterns by learning user behaviour and responses. It then automatically adjusts warnings for outgoing emails and prevents users from receiving similar warnings multiple times.
Read more:
https://www.hornetsecurity.com/en/press-releases/launch-of-365tp-plan4-with-airv
Reminder
Tips for identifying malicious emails
Professional cyber attacks via email are very difficult to detect, but there are a few clues for detecting fraud. First of all, if a fraudulent email is suspected, Verify whether the sender address actually matches the original domain. Consider carefully whether the sender is really an acquaintance or business partner of yours or whether the email address only resembles that of the actual person. Check for spelling and grammar mistakes, especially if the email is supposed to come from a reputable company. An impersonal form of address in the cover letter, such as “Dear Ladies and Gentlemen,” is another clue. Be careful with links or buttons placed in emails, because as a “normal user” it is very difficult to check whether the apparent link target is actually correct. In case of doubt, it is safest not to click on any attached link.
Sunday, September 3, 2023
GoldeN Rules- 13
Simplify IT concepts for non-technical users.
While IT professionals are familiar with terms like botnets,
DDoS attacks, drive-by downloads, and spear phishing campaigns, many users may
not be. It's crucial to make things easy to understand.
Think of it this way: imagine explaining complex ideas to a
5-year-old. That's the approach we should take when explaining cyber security
to non-technical folks. We want to break it down into simple terms that anyone
can grasp.
If you or your users need a handy reference, I recommend
checking out this glossary of cyber security terms on TechAdvisory.com. It can
be a great resource for understanding the jargon and making the topic more
approachable.
Sunday, August 27, 2023
Cybercrime Statistics 2023
As you will see, unlike most horror movie franchises that get progressively less frightening year after year (and eventually become silly), the story here has become even more terrifying.
- Approximately 43% of cyberattacks target SMBs. [Source]
- 60% of SMBs experienced at least one cyberattack in the last year, and 18% of them experienced six or more. [Source]
- 67% of SMBs said that they are more concerned about IT security now than a year ago. [Source]
- 32% of SMBs are allocating less than 5% of their IT budget towards IT security, which is below the recommended minimum amount. [Source]
- The average cyberattack insurance claim cost for SMBs is now $139,000 per claim (all figures in this article are USD), which is more than double the 2021 level. [Source]
- Cyber insurance premium costs have increased by an average of 28%, and many companies are finding it harder to get coverage. [Source]
- The financial toll of a cyberattack on SMBs now ranges from $120,000 to $1.24 million per incident, depending on factors such as the number of compromised records involved. [Source]
- The financial toll of a cyberattack on larger organizations has climbed to $4.54 million per incident — the highest number ever recorded. [Source]
- The number of malware attacks has reached 5.5 billion per year, which is 2% higher than the previous year. [Source]
- Zero-hour threats, which exploit vulnerabilities before they are known and patched, now account for 54% of all threats. [Source]
- Over 850,000 domain names per year are now reported for phishing. [Source]
- 71% of businesses say they have fallen victim to ransomware attacks. [Source]
- Approximately 50,000 websites are hacked each day, and there is an attack on a website every 39 seconds. [Source]
- 18% of all websites are alleged to contain critical severity threats, and 4.1 million websites contain malware at any given time. [Source]
- 17% of all cyberattacks are Business Email Compromise (BEC) attacks, in which hackers try and trick corporate victims into sending money or divulging confidential company information. [Source]
- 74% of organizations are at least moderately vulnerable to insider threats. [Source]
- The average ransomware payment has surged to $4.4 million. [Source]
- It takes an average of 277 days — or roughly 9 months — for businesses to identify and report a data breach. [Source]
- The number of IoT malware attacks annually reported has reached 112.3 million instances — an 87% year-over-year increase. [Source]
- The global cost of cybercrime is predicted to reach $8 trillion annually in 2023. [Source]
Ninite.com - download commonly installed programs all at once when setting up a new computer.
Ninite.com is a free and user-friendly service that simplifies the process of installing and updating commonly used software on Windows com...
-
Ninite.com is a free and user-friendly service that simplifies the process of installing and updating commonly used software on Windows com...
-
Microsoft recently released an update for Windows 11 build 26052, addressing several critical issues that users have encountered since its ...
-
Investigating information security incidents is not as hot a topic as pentesting, but this scientific and practical discipline continues to ...