Tech Wrap-Up Week 32 2022

Tech Wrap-Up Week 32 2022

Tech Wrap-Up Week 32 2022, a temperate Bay Area summer’s week inspired by Cat Day, Book Lovers Day, Lazy Day, Son and Daughter Day, and Vinyl Record Day. Today, we look back at this week’s ten most engaging stories from the Tech Help Knowledgebase social media feeds. We order the story summaries below by user engagement (posts with the most likes, shares, clicks, hashtag clicks and detail expands) and by the number of impressions they received. Stories are in descending order with the most engaging story at the top. Our human-curated social media feeds include links to technology news, how-to and help articles, and video tutorials for common issues.

Stories curated for our feeds are from our staff writers or culled from third-party sources that produce content related to the categories covered by our site. See the summaries and links below for this week’s top stories by user engagement. Follow us on Twitter, Facebook, Instagram, and YouTube to interact with our feeds.

Top 10 Most Engaging Stories This Week

1. Why You Should Be Using Google Chrome’s Enhanced Safe Browsing Mode (CNet)

When Chrome users enable Safe Browsing, they receive real-time notifications about malicious and intrusive ads, malware, risky extensions, phishing, and potentially unsafe websites. In doing so, Chrome helps to protect users’ privacy and safety online and across Google products. In order to provide this level of security, however, Chrome users send more data to Google. This, in turn, associates your data with your Google account.

2. A Linux Zero-Day Was Finally Patched After Half a Decade of Inaction With Help From Google (Gizmodo)

Google revealed details from its Threat Analysis Group today about a Linux kernel zero-day exploit dating back to at least 2016. The vulnerability was patched in September 2021. Assigned CVE-2021-0920, the flaw was an in-the-wild exploit in a garbage collection mechanism. Attackers used the flaw to gain control of users’ devices.

3. What is XProtect on Mac? Is it Enough to Keep your Mac Safe? (Trend Micro)

XProtect is to macOS as Defender is to Windows. Both operating systems include these free, built-in anti-malware systems to defend against malware. XProtect comes pre-installed on macOS. It runs in the background without consuming much in the way of system resources. Unlike some antivirus applications, XProtect does not continuously monitor macOS but instead scans downloads for threats. Because XProtect affords only basic malware protection and does not constantly monitor the system for threats, macOS users may wish to install supplemental antivirus protection.

4. Malware-packed Chinese apps found on Mac App Store (TechSpot)

This story comes from the analysis of a researcher who explored seven Apple developer accounts that the same Chinese developer manages. The researcher discovered hidden malware in apps that have the ability to receive commands from a command-and-control server. The hidden malware allowed the apps to circumvent Apple’s security checks before activation of the malware.

5. How to automatically delete political spam in Gmail (Tech Help Knowledgebase)

Learn how to delete political spam in Gmail. The Federal Election Commission (FEC) recently decided to advance a Google pilot program to allow political committee emails to circumvent Gmail spam filters. The plan allows emails from “authorized candidate committees, political party committees, and leadership political action committees registered with the FEC” to arrive in inboxes as long as they do not break Gmail rules.

6. Hackers are still using these old security flaws in Microsoft Office. Make sure you’ve patched them (ZDNet)

Hackers continue to use old vulnerabilities in Microsoft Office as an attack vector for malware. The ongoing attacks show the importance of keeping your software up-to-date by applying security updates. This article from ZDNet shines a light on two specific flaws. One flaw allows attackers to execute PowerShell scripts. The other is a stack buffer overflow vulnerability. Both flaws were discovered in 2017.

7. Microsoft August 2022 Patch Tuesday fixes exploited zero-day, 121 flaws (Bleeping Computer)

Yesterday, Microsoft rolled out its massive monthly software update, patching a total of 121 flaws including two zero-day vulnerabilities. Out of 121 total patched flaws, Microsoft categorized seventeen of them as Critical. Microsoft previously patched twenty Edge flaws that are not included in the Patch Tuesday tally.

8. Vivaldi browser 5.4 released (Tech Help Knowledgebase)

Vivaldi Technologies released version 5.4 of its Vivaldi web browser today. The release includes automatic HTTPS upgrades, Vivaldi Mail improvements, customizable mouse Rocker Gestures, and more. We recommend our readers update their Vivaldi installations as soon as possible.

9. The Security Pros and Cons of Using Email Aliases (Krebs on Security)

Email address aliases are very useful for a variety of reasons that include the detection of data breaches, fighting spam, and organizing your email. This piece from security researcher Brian Krebs dives into what an email alias is, the benefits of using them, and the downside of aliases.

10. How to find out if you are involved in a data breach — and what to do next (ZDNet)

Whether you know it or not, your personal information has likely been involved in a data breach. Twenty percent of data breaches come from cyberattacks against corporate networks via compromised credentials. This piece from ZDNet goes into further details about different attack methods, what happens when an attack is inside a network, what is the dark web, the impact of breaches on you, and more. The first resource you should use to identify if a breach leaked your data is Have I Been Pwned.

Thank you for visiting Tech Help Knowledgebase to read the Tech Wrap-Up Week 32 2022, a summary of this week’s ten most engaging stories. If you liked this article, follow us on Twitter @techhelpkb and subscribe to our YouTube channel to keep in the loop.