Tech Wrap-Up Week 30 2022

Tech Wrap-Up Week 30 2022

Tech Wrap-Up Week 30 2022, the final week of July which included Hot Fudge Sundae Day, Aunt and Uncle Day, Scotch Day, Chili Dog Day, and Lasagna Day. Today, we look back at this week’s ten most engaging stories from the Tech Help Knowledgebase social media feeds. We order the story summaries below by user engagement (posts with the most likes, shares, clicks, hashtag clicks and detail expands) and by the number of impressions they received. Stories are in descending order with the most engaging story at the top. Our human-curated social media feeds include links to technology news, how-to and help articles, and video tutorials for common issues.

Stories curated for our feeds are from our staff writers or culled from third-party sources that produce content related to the categories covered by our site. See the summaries and links below for this week’s top stories by user engagement. Follow us on Twitter, Facebook, Instagram, and YouTube to interact with our feeds.

Top 10 Most Engaging Stories This Week

1. One of the most beloved Windows tools could actually be a huge security risk (Tech Radar)

When I first read this headline, I admit I was curious. What is a beloved Windows tool? Is there such a thing? So I dug deeper. The tool: Calculator. OK, it may be the Windows tool I use more than any other, but beloved? More like convenient. My ears perked up when I read that it could be a security risk. It begins with a phishing attempt, an attacker emails a .zip file, the target extracts the zipped files, mounts an .ISO that contains .DLL files, one of which is Qbot malware. Say that ten times fast.

2. Your boss might be reading your work messages. Here’s how to prevent that. (Washington Post)

My thinking on workplace privacy is that the people who pay you to work there have a right to make sure they get the maximum bang for their buck. That includes monitoring you and your communications to ensure you do the job they pay you to do. With that in mind, act accordingly. When you are at work using work devices, even if you are a remote worker, do your job. You and everything you do is being watched.

3. Update your browser! Chrome, Edge, and Safari patched against zero-day flaw (Kim Komando)

A zero-day vulnerability in the world’s most-used web browsers is never good. Google and Microsoft patched this particular zero-day in Chrome and Edge in early July. Apple patched the flaw last week. You secure your system from the flaw if you update your software. The lesson — keep your software up to date at all times. Make it a top priority, like breathing and hydrating.

4. These ransomware hackers gave up when they hit multi-factor authentication (ZDNet)

If you do not want to jump through two-factor (2FA) or multi-factor authentication (MFA) hoops, listen up. MFA could save your bacon. Europol reported a ransomware attack in which MFA thwarted the effort. MFA deters attacks even when in possession of a legitimate account password. When a ransomware attacker has your password but still cannot access your account, then they are unable to exploit it for a ransom. Use MFA on all accounts that support it, and request MFA for those accounts that do not support it.

5. Microsoft Will Change a Windows Security Default to Block Ransomware (Extreme Tech)

Despite the innocuous Windows Calculator app getting some press today, this new feature is far more deserving of attention. Microsoft changed a default security setting in the most recent Windows insider build. The change, coming to Windows 11 and Windows 10, enables by default a lockout protocol for Remote Desktop Protocol to mitigate brute force password attacks. The idea is to block ransomware from your computer.

6. Mozilla releases Firefox 103 (Tech Help Knowledgebase)

Mozilla released Firefox 103 today with improved WebGL performance on Linux, improved performance on high-refresh rate monitors of 120Hz or higher, stronger security, and lots more goodies for Firefox fans (a browser I use each day). We recommend our readers update their Firefox installations as soon as possible.

7. Is Zero Trust segmentation the answer to mitigating ransomware threats? (Beta News)

A reason ransomware attacks are at an all-time high is because companies continue to migrate to cloud-based infrastructures. A recent research report from ESG discovered that 76 percent of IT professionals surveyed experienced at least one ransomware attack in the last 12 months. Even worse, a whopping 82 percent decided to pay the ransom to the tune of $495,000 on average. The motivation to pay a ransom stems from a fear of downtime and loss of critical data. Adopting zero-trust principles, where data and applications become isolated to protect against the spread of breaches across environments, may stem the proliferation of ransomware.

8. Why You Probably Need To Stop Using Your Android Phone’s Built-In Browser (Slash Gear)

One of the many reasons I stopped using Apple devices is the restriction on changing default applications like the web browser. Granted, Apple finally changed their tune on default apps, but too little, too late for me. No matter whether I get a new phone, laptop, or desktop, I immediately change the default browser. My default browser is Brave on all my devices. Although Slash Gear only mentions using DuckDuckGo and Firefox Focus privacy browsers as alternative default browsers, I am throwing Brave into the mix.

9. Apple’s new Home app in iOS 16 is better but still half-baked (The Verge)

Apple’s Home app, which controls HomeKit smart devices, launched in 2016. Since then, the Home app has not received many significant updates. iOS 16 has given it another lease on life with a complete redesign. The massive update relates to Matter, a new smart home standard developed by top technology companies, including Apple. The Verge thinks the new Home app still lacks the critical tools needed to make it truly smart.

10. Hackers scan for vulnerabilities within 15 minutes of disclosure (Bleeping Computer)

Here is some bad news for system administrators. The amount of time it takes for hackers to start scanning for vulnerabilities is within 15 minutes after the public disclosure of a bug. In one example, a May 4, 2022, flaw disclosure yielded 2,552 scanning and exploitation attempts within 10 hours. The race is on, and here comes scan up the backstretch.

Thank you for visiting Tech Help Knowledgebase to read the Tech Wrap-Up Week 30 2022, a summary of this week’s ten most engaging stories. If you liked this article, follow us on Twitter @techhelpkb and subscribe to our YouTube channel to keep in the loop.