Businesses to boost Windows 11 adoption in ‘24, but Windows 10 still dominates
Businesses are likely to accelerate their adoption of Windows 11 next year, as the 2025 Windows 10 support deadline trumps underlying economic concerns. Almost two years after the operating system’s launch, the total installed base for Windows 11 stands at around 25% to 30%, said Linn Huang, research vice president for devices and displays at […] more…Threat hunting converting SIGMA to YARA
Malware threat hunting is the process of proactively searching for malicious activity. It is a critical part of any organization’s security posture, as it can help to identify and mitigate threats that may have otherwise gone undetected. Sigma rules and YARA rules are two powerful tools that can be used for detection and malware threat […] more…DuckDuckGo launches privacy-first Windows browser in beta
DuckDuckGo, the privacy-centric internet company best known for its search engine of the same name, released a public beta of its own browser for Windows PCs today. Characteristically, the browser puts user privacy front and center. DuckDuckGo said that the browser (called simply “DuckDuckGo for Windows”) boasts “best-in-class” privacy functionality, which is enabled by default. […] more…Inside of the WASP’s nest: deep dive into PyPI-hosted malware
Photo by Matheus Queiroz on Unsplash In late 2022 we decided to start monitoring PyPI, arguably the most important Python repository, as there were a number of reports on it hosting malware. PyPI took exceptional relevance amongst all repositories as, historically, it was trusted by default by many software developers. Any security breach or abuse […] more…Apple’s Vision Pro: The pros and cons of head-mounted hardware
I remain convinced that the market is looking for something revolutionary like Apple’s recently announced Vision Pro to replace smartphones, tablets, and PCs. I’m not yet convinced Vision Pro will do that, but it is on the right path. Now that Apple has made a move, rivals will increasingly be in the hunt to see […] more…AI boosts Code Language and File Format identification on VirusTotal
We are pleased to announce that VirusTotal has improved the identification of programming languages and file formats through the implementation of Generative AI (artificial intelligence). Historically, automating these tasks has been quite challenging, especially when it comes to certain scripting and plain text file formats. However, with the aid of Generative AI, we have expanded […] more…Apple’s Vision Pro: Can it leap the headset-wearing hurdle?
Apple’s Vision Pro enters a troubled market. I say troubled because people have so far largely rejected head-mounted devices. Though before the iPod arrived, the market didn’t care much for digital music players, and before the iPhone, people didn’t care much for screen-based phones. So this should be familiar territory for Apple. The iPod and […] more…Apple Silicon remains the star of WWDC
Apple Silicon is still the real star of WWDC. The company’s Vision Pro headset may be grabbing most of the attention, but enterprise professionals will recognize that Apple’s chips have enabled the company to explore new forms of computing, including eyewear. Apple’s Mac and processor news in brief First, Apple introduced the M2 Ultra processor. […] more…IT is driving new enterprise sustainability efforts
From an energy efficiency perspective, sustainability has always been a “no brainer” for IT, says Lee Green, chief architect at Blue Cross Blue Shield of Massachusetts (BCBSMA). The business imperative to streamline business processes and optimize IT operations was driving efficiency improvements well before the healthcare insurer developed its corporate sustainability framework. Now, however, investors, […] more…Who wants a regular laptop with a 100-in. screen?
Here comes an entirely new kind of computer. Events like this don’t happen often. So, we should all stop and marvel at the emergence of what I call the ARPC — the “augmented reality PC.” The “form factor” solves the decades-old desire to maximize screen size while minimizing hardware size. And it’s ideal for the […] more…The metaverse: Not dead yet
The metaverse has been described as the next phase of the internet: interconnected and persistent 3D spaces where we will work, play, and, so it seems, purchase virtual real estate. But metaverse-related technologies have failed to keep up with the considerable hype, the vision of ultrarealistic virtual environments offered by tech vendors miles away from […] more…20 seconds to smarter Chromebook multitasking
If you love finding hidden software treasures as much as I do, Google’s ChromeOS operating system is a productivity playground like no other. ChromeOS is in a constant state of evolution, y’see, with new releases landing every four weeks and fresh ‘n’ fancy features more or less always under development and begging to be discovered. […] more…Microsoft Edge is getting a bit pushy
Edge, sit down. We need to talk. (You too, Bing.) Lately you’ve gone from a browser that was ignored by many but had the potential to be a very well-behaved and secure browser to one that is being, well, a bit pushy. And Bing has been taking a page from your playbook and gotten a […] more…5 smart Chrome browser alternatives for Android
Google Chrome is the default browser on Android phones. But maybe you want to use another browser because you prefer to avoid Google apps, you’re looking for stronger privacy safeguards, or other reasons. Or maybe you simply want to keep a secondary browser on your phone to serve as a backup or for specific tasks. […] more…VirusTotal += Mandiant Permhash: Unearthing adversary infrastructure and toolkits by leveraging permissions similarity
Last Monday our colleagues over at Mandiant rolled out Permhash. In their own words, Permhash is an extensible framework to hash the declared permissions applied to Chromium-based browser extensions and APKs allowing for clustering, hunting, and pivoting similar to import hashing and rich header hashing. We are excited to announce that we have been working […] more…Prepare for generative AI with experimentation and clear guidelines
Generative AI is catching on extremely quickly in the corporate world, with particular attention from the C-suite, but it’s still new enough that there aren’t any well-established best practices for deployment or training. Preparing for the technology can involve several different approaches, from conducting pilot projects and lunch-and-learns to forming centers of excellence based around […] more…More information
- UN Experts: North Korea Using Cyber Attacks to Update Nukes
- Linux Flaw Allows Sudo Users to Gain Root Privileges
- Design Is Why 2048 Sucks, and Threes Is a Masterpiece
- Raising Awareness: WPBeginner Spotlight
- Apple ships iOS 10.2, fixes ‘Find my iPhone’ hole plus five lockscreen bugs
- Have a two-factor authentication backup plan and sleep better tonight
- Data Security Company Open Raven Raises $15 Million
- Microsoft plans to add containers to Windows client, too
- New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones
- 5 Must Have Android Apps for Techies