Last updated: May 10, 2022
Tech Wrap-Up 5-9-2022. Wine? Wine not, thank you! Today is National Moscato Day. It is the perfect day to pop the cork on this Italian treat. In fact, it may even be the perfect day to enjoy it as dessert before dinner. Please drink responsibly. While you drink wine, Tech Help Knowledgebase wraps up the day with a summary of today’s most engaging stories from our social media feeds. We order the story summaries below by user engagement (posts with the most likes, shares, clicks, hashtag clicks and detail expands) and by the number of impressions received. Our human-curated social media feeds include links to technology news, how-to and help articles, and video tutorials for common issues.
Stories curated for our feeds are from our staff writers or culled from third-party sources that produce content related to the categories covered by our site. See the summaries and links below for today’s top stories by user engagement. Follow us on Twitter, Facebook, Instagram, and YouTube to interact with our feeds.
Today’s Tech Wrap-Up
1. Hackers are now hiding malware in Windows Event Logs (Bleeping Computer)
Hiding malware in Windows Event Logs is a new attack vector or at least one that has not yet been documented. According to Bleeping Computer, the method inserts “shellcode payloads into Windows event logs for the Key Management Services, an action completed by a custom malware dropper. The dropper copies the legitimate OS error handling file WerFault.exe to ‘C:\Windows\Tasks’ and then drops an encrypted binary resource to the ‘wer.dll’ (Windows Error Reporting) in the same location, for DLL search order hijacking to load malicious code.”
2. 3 cybersecurity priorities for digital transformation (Security Magazine)
A recent report from WWT Research pinpoints cybersecurity priorities that security professionals should consider when trying to protect their organization. The priorities are 1. Cyber resilience, 2. Implementing zero trust, and 3. Identify and access management. The ever-changing cybersecurity landscape faced by organizations includes remote/hybrid work and an increase in cloud-based infrastructure. The new landscape necessitates that organizations consider these priorities.
3. So you want to open-source an algorithm (Protocol)
I won’t get into who started this conversation about open-sourcing algorithms. In this episode of Protocol Source Code, Protocol reporter Kate Kaye explains more about how this actually works and the type of challenges you know who may face in trying to do so. Open-sourcing an algorithm may be harder than it sounds.
4. Tor Browser 11.0.11 released with important security updates to Firefox (Tech Help Knowledgebase)
The Tor Project released Tor Browser 11.0.11 recently. Mozilla patched five “high impact” security vulnerabilities in Firefox ESR 91.9, the basis for Tor Browser. Tor Browser 11.0.11 implements the patches. Browser privately. Explore freely. Defend yourself against tracking and surveillance, and circumvent censorship with Tor Browser.
Apple’s iOS and iPadOS allow users to override any general accessibility features with changes they want to make on a per-app basis. The configuration of features on an application-level includes text, button shape, labels, transparency, contrast, color differentiation, inversion, control over motion, auto-play of videos, and cross-fades.
6. Mozilla’s Thunderbird is going mobile, ten years too late (Android Police)
Thunderbird mail client garners a mere .08% market share. I am happy to say that I am in the .08%. Many changes are coming to Thunderbird soon, including a new mobile app. As a satisfied Thunderbird user, I am looking forward to seeing the changes, features, and apps pushed into production.
Henry Irvine, Contributing Technology Writer, translates more than a decade of internet technology experience in product and customer relationship management into practical help and how-to content. Look for him on Bay Area trails, music venues, or sausage shacks when he’s not writing. Don’t call him Hank if you see him. Seriously. Hank on Twitter