Tech Wrap-Up 5-18-2022, which is the 42nd anniversary of the Mount St. Helens eruption in Washington state. It became the deadliest and most destructive volcanic eruption in US history. The eruption killed fifty-seven people and caused over $1 billion in damage. While you contemplate how it could be 42 years already, Tech Help Knowledgebase wraps up the day with a summary of today’s most engaging stories from our social media feeds. We order the story summaries below by user engagement (posts with the most likes, shares, clicks, hashtag clicks, and detail expands) and by the number of impressions received. Our human-curated social media feeds include links to technology news, how-to and help articles, and video tutorials for common issues.
Stories curated for our feeds are from our staff writers or culled from third-party sources that produce content related to the categories covered by our site. See the summaries and links below for today’s top stories by user engagement. Follow us on Twitter, Facebook, Instagram, and YouTube to interact with our feeds.
Today’s Tech Wrap-Up
1. The Big Myth About Mac Computers You Need To Stop Believing (SlashGear)
In true Apple style, when the going gets rough, change the marketing. Once thought to be impenetrable to malware, the truth is that pretty much any computer is subject to attack — including Macs. The best defense begins with users adhering to best practices when it comes to safe browsing, downloading, and connecting to HTTPS sites only.
There is a new word in the cybersecurity lexicon. Cryware. A Microsoft blog post explains cryware as, “information stealers that collect and exfiltrate data directly from non-custodial cryptocurrency wallets, also known as hot wallets. Because hot wallets, unlike custodial wallets, are stored locally on a device and provide easier access to cryptographic keys needed to perform transactions, more and more threats are targeting them.” This article from ZDNet lists some good tips for protecting hot wallets.
3. Does Windows 10 Need or Come with Antivirus? (US News & World Report)
The answer is yes, both Windows 10 and Windows 11 come with Microsoft Defender (previously known as Windows Defender), which is built-in antivirus and anti-malware protection. Defender protects against threats through signature and behavior detection, scanning the hard drive, and blocking phishing and ransomware attempts. Read this piece from US News & World Report for information about how to use Microsoft Defender.
The security-vetted software libraries, numbering 550 major libraries at the moment, are coming to Google Cloud customers in the third quarter of 2022. The service, known as Assured Open Source Software, is comprised of open-source packages used by Google internally. Google scans and analyzes the packages on a regular basis for vulnerabilities. An Open Source Maintenance Crew of Google engineers will also work with the libraries’ maintainers in an effort to improve security.
5. You Can Make It Way Harder for Cookies to Track You in Edge (Lifehacker Australia)
Any steps one can take to improve security and privacy are steps worth taking. Microsoft Edge, the default Windows browser, includes many options along these lines. One such option makes it harder for tracking cookies to follow you. Check out this article from Lifehacker Australia for information about how to clear the browsing history, download history, cookies, cached images, passwords, autofill data, and site permissions every time you close Edge.
Patching security flaws is good, even when the patch arrives late. This week, Apple released Big Sur 11.6.6 and Security Update 2022-004 Catalina. Apple patched these vulnerabilities back in March for macOS Monterey.
Thank you for visiting Tech Help Knowledgebase to read the Tech Wrap-Up 5-18-2022. If you liked this article, follow us on Twitter @techhelpkb and subscribe to our YouTube channel to keep in the loop.
Henry Irvine, Contributing Technology Writer, translates more than a decade of internet technology experience in product and customer relationship management into practical help and how-to content. Look for him on Bay Area trails, music venues, or sausage shacks when he’s not writing. Don’t call him Hank if you see him. Seriously. Hank on Twitter