The U.S. Department of Homeland Security has issued a warning to remove Apple’s QuickTime for Windows. The alert came in response to Trend Micro’s report of two security flaws in the software, which will never be patched because Apple has ended support for QuickTime for Windows.
Computers running QuickTime are open to increased risk of malicious attack or data loss, US-CERT warned, and remote attackers could take control of a victim’s computer system. US-CERT is part of DHS’ National Cybersecurity and Communications Integration Center.
“We alerted DHS because we felt the situation was broad enough that people having unpatched vulnerabilities on their system needed to be made aware,” said Christopher Budd, global threat communication manager at Trend Micro. The only mitigation available is to uninstall QuickTime for Windows,” US-CERT’s alert said.
Instructions from Apple can be found here: https://support.apple.com/en-us/HT205771Apple has not discontinued security updates for QuickTime on Apple computer systems – just Windows based systems. It is not clear why Apple made the decision to end Windows support.
Zero Day Warning
Trend Micro’s Zero Day Initiative learned about the vulnerabilities from researcher Steven Seeley of Source Incite, who is named in the warning. ZDI then issued advisories detailing the critical vulnerabilities:
• The Apple QuickTime moov Atom Heap Corruption Remote Code Execution vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QuickTime. The problem first came to ZDI’s attention late last year. The number of users at risk is unknown at this time.
• The QuickTime Atom Processing Heap Corruption Remote Code Execution Vulnerability allows an attacker to write data outside of an allocated heap buffer by providing an invalid index.
Software makers regularly retire applications, so it’s not unusual that QuickTime would be vulnerable. However, it was odd that Apple did not issue a public statement about ending its support for QuickTime for Windows and that the software was still available for download.
Increasing Software Vulnerability
QuickTime joins a growing list of software that is not supported any longer. That list includes Microsoft Windows XP and Oracle Java 6, which means users of those operating systems increasingly will be vulnerable to attack.
DHS didn’t have any comment to add to its alert, said spokesperson Scott McConnell, who referred questions to Apple. Apple did not respond to requests to comment for this story.
The warnings come amid recent reports about computer system vulnerabilities, including one issued just a few days ago about a vulnerability in Adobe’s Flash Player that could leave computers open to ransomware, which can lock up entire systems until an attacker is paid to release control.
Microsoft has published a Windows 10 roadmap for Business and Enterprise customers that reveals upcoming features of the operating system as well as a planned release month for the operating system’s Anniversary Update. Microsoft plans to release the Anniversary Update in July 2016.
While things may change depending on how development progresses, it is very likely that Microsoft will push out the free Anniversary Update to all Windows 10 devices around July 2016.
Upcoming Windows 10 Features
The list of features is probably what’s most interesting from a user’s and administrator’s point of view. While many are designed for Business or Enterprise use, some are available in all editions of the operating system.
Microsoft divides the feature listing into the categories “recently available”, “in public preview”, “in development” and canceled. The “recently available” and “canceled” categories are mysteriously empty from the official roadmap.
In Public Preview
These features are already part of Windows Insider builds or other preview builds of the operating system
•Enterprise Data Protection: Designed to help prevent Enterprise data leaks, even on employee-devices. The feature ships with three protective modes: block, which analyzes activity and blocks employees from completing actions that would lead to inappropriate data sharing, override, which warning employees only, and silent, which logs but does not block or warn.
•Multifactor authentication for apps and websites: Use Windows Hello or Microsoft Passport to authenticate to an application or website.
•Microsoft Edge – Extensions: Extensions support for Microsoft Edge.
•Microsoft Edge – Pinning Tabs: Options to pin tabs in the Microsoft web browser.
These features are currently in development and not available for public preview at this point in time.
•Windows Defender Advanced Threat Protection: A new service to help Enterprises respond to “advanced attacks” on their networks.
•Enhancements to Microsoft Passport: Unclear at this point how these enhancements will look like.
•Use your phone to unlock your Windows PC: Use a Windows or Android phone to unlock Windows 10 PCs, and authenticate with apps and services uses Windows Hello and Microsoft Passport.
•Use Companion Device to unlock your Windows PC: Use devices like the Microsoft Band 2 for Microsoft Passport basic authentication. Can also become a second authentication factor to unlock Windows 10 PCs.
•Touch screen support: Support for touch input when a phone that is compatible with Continuum is connected to a device connected to a touch monitor.
•Laptop-like accessory support: Support for a new accessory that looks like a laptop but does not ship with CPU or operating system. Designed for use with Continuum-compatible phones to use the phone with a laptop-like experience.
•Projecting on PCs: Continuum-supporting phones can not only be connected to standalone monitors or screens, but also to Windows 10 PCs.
•Microsoft Edge – Web Notifications: Adds support for Web Notifications to Microsoft Edge.
•PC to PC casting: Cast from one PC to another.
•Windows Ink: New and improved support for pen and touch-enabled devices.
•Cortana and Action Center Integration: Moves proactive Cortana notifications to the Action Center.
•Remote Display Experience: Windows 10 IoT feature that provides you with options to connect devices without displays remotely to devices with displays.
•Start Menu updates: Improvements to the start menu that make it easier to access all apps, and improve touch input support.
•Picture in Picture: Windows Apps will get a new picture in picture mode.
Why this matters
Software makers tend not to talk about features that they’re still developing and could end up cancelling, but with Windows 10, Microsoft has tried to be more transparent and open to feedback.
Providing a glimpse at far-out features could help businesses plan their updates, and could also help Microsoft prioritize which of those features should come first.
What features would you like added to Windows 10?
When you’re on Facebook, do you ever get the feeling that you’re being watched? An ad pops up that’s right up your alley, or three new articles show up in your feed that are similar to something you’ve just recently clicked on.
Sometimes it seems like Facebook knows you personally, and that’s because it does. It has algorithms that track what you like, watch and click on. Facebook uses this information to target ads to users on behalf of its paid advertisers.
Facebook itself isn’t the only culprit. Tons of companies use Facebook’s platform as a way to track you. In fact, right now there a probably dozens of companies that are watching your posts, storing your profile information and more, without you even realizing it.
How did this happen in the first place? When Facebook first started out, people rushed to join because of the many perks that it offered. One of those perks, and probably the most appealing, was the fact that Facebook was entirely ad-free. You could use the service to connect with family and friends without being bothered by someone trying to sell you something.
Well, like they say, “All good things must come to an end.” Eventually, Facebook began selling ads like everyone else. And that’s when everything changed.
People realized that Facebook provided a treasure trove of information for advertisers. By clicking “like” users were telling companies exactly what they wanted — more of this, less of that. This led to the big data tracking we now see.
Three sneaky ways companies are tracking you: Most people understand that Facebook is tracking their preferences whenever they use the app. But, few realize they’re being tracked in other ways too. And, that’s what these third-party companies are banking on. If you don’t know you’re being tracked, then you won’t ask them to stop.
Here’s three things to watch out for.
1: Facebook apps: This is when you receive a request to play a Facebook game your friends are obsessed with, and you decide to sign up. If you’ve ever done this before, then you’ve allowed that app developer to track you. These third-party apps integrate with your Facebook profile and can ask Facebook for permission to pull various personal data, from your work history to timeline posts. And although you can edit what information they can access, very few people do.
2: Facebook logins: This is when you visit a site and it says “Log in with Facebook,” and you do, then you’re letting that company track you.
3: Friends’ apps monitoring you: Even if you didn’t download an app, your Facebook settings may allow apps your friends have installed to also see YOU. It’s pretty scary.
You might be wondering why this even matters, and how it really impacts you personally. The easiest way to answer those questions is to point out all of those big data breaches you hear about almost daily. Hackers rarely waste time on individuals these days. They’ve got much bigger fish to fry. Large retailers, for example – or the databases where these third-party companies store the information they’ve gathered. That’s why everyone should take these steps to protect their private information.
Some Options To Help Stop The Tracking Madness:
Review and edit installed apps: To see what apps you’ve installed over the years, open Facebook in your browser, click the down arrow in the upper right corner and select “Settings.” Then click on the “Apps” header in the left column.
To see what information an app is accessing, click the pencil icon next to any of the apps to see and edit the settings. The first setting lets you set who can see that you use the app. It defaults to “Only Me,” so it isn’t a big deal. Below it, however, is another story.
In the case of Skype, for example, it pulls your public profile information along with your list of friends, email address, birthday and hometown.
Remember that this information is being stored on a third-party server. Not every app developer is going to have Microsoft-level security, and hackers are good at turning tiny pieces of stolen information into big gains.
If you want to keep using the app, you can deselect certain items, such as your email address. Be aware that won’t remove the information from the app developer’s servers, however. If you change your email address in the future, however, the developer won’t get the new one.
Remove apps you don’t use: If you don’t want to use the app anymore, you can click the “Remove app” link at the bottom of the page. Just remember that this won’t automatically remove your information from the app developer’s servers. For that you’ll need to contact the app developer directly. Facebook has a link for more information on this under the “Remove info collected by the app” section in the app’s settings.
Turn off apps completely: If you’ve deleted all the apps, and you’re not keen on accidentally installing more in the future, you can turn off the app platform completely. Just note you won’t be able to install apps or log in to third-party sites using Facebook until you turn this back on.
To turn off the app platform, go back to the App Settings page. Under “Apps, Websites and Plugins,” click the “Edit” button. At first, this just looks like a way to disable app notifications and invites from other people, which is a big help on its own. However, you’ll want to click the “Disable Platform” link in the bottom left corner.
Facebook gives you their standard warning about what disabling the platform does. If you’re OK with it, click the “Disable Platform” button. Unfortunately, this won’t remove information that app developers might have collected about you already.
Stop logging into sites using Facebook: In the future, when you’re adding an app or logging into a website try to avoid logging in with your Facebook account. But, if you must use Facebook to log in, then look for the “Log in Anonymously” or “Guest” option so it won’t share your information.
Stop friends’ apps from seeing your info: Apps can still get your information through your friends. As your friends install apps, those apps can request permission to get info about you.
To put a stop to this, go back to the App Settings page. Then under “Apps Others Use” click the “Edit” button. You’ll see everything that your friends’ apps can see about you. Go through and uncheck every option listed on the page, and then click “Save.” Now companies can’t track new information about you.
It’s up to each of us to monitor and maintain what information we want shared with others. I’m sure you’ll be very surprised when you log in and check your Facebook app settings.
Do you own an older Kindle that’s been gathering dust? Get it updated before March 22 or you won’t be able to get online and download your books any more.
This is pretty much their final warning: If you have a Kindle, you need to update it before March 22 or it’s going to lose Internet connectivity.
That outcome would be very bad, because without the update you’ll no longer be able to access the Kindle Store or sync your device with the cloud, not to mention any other Kindle services you might be using. According to Amazon, the update is required to ensure the Kindle remains compliant with continuously evolving industry web standards.
You’ll know if your Kindle didn’t get updated in time because you’ll see the following message on your device: “Your Kindle is unable to connect at this time. Please make sure you are within wireless range and try again. If the problem persists, please restart your Kindle from the Menu in Settings and try again”
If you’ve been using your Kindle regularly then it’s most likely going to be fine. Kindles will update automatically via Wi-Fi, but if the device has been turned off or out of battery for a while, charge it up and make sure you Sync and Check for Items.
When the update has been applied you’ll find a confirmation letter called “03-2016 Successful Update” on your device. You can check for it by viewing all Recent items in your Kindle Library.
The following devices don’t need the update:
Kindle Paperwhite (6th and 7th generation)
Kindle 7th Generation
Kindle Voyage 7th Generation
If you’ve got one of the following, you do need the update:
Kindle 1st Generation (2007)
Kindle 2nd Generation (2009)
Kindle DX 2nd Generation (2009)
Kindle Keyboard 3rd Generation (2010)
Kindle 4th Generation (2011)
Kindle 5th Generation (2012)
Kindle Touch 4th Generation (2011)
Kindle Paperwhite 5th Generation (2012)
Amazon also points out that the Kindle Keyboard 3rd Generation, the Kindle Touch 4th Generation and the Kindle Paperwhite 5th Generation will only update via Wi-Fi, even if you have the 3G connection active.
If you do miss today’s deadline, you’ll need to manually download and install the required update. You can get more information on that process here.
More than 200 million users are currently running Windows 10 and that number is growing rapidly. The temptation to save money with Microsoft’s free upgrade might be so strong that you’re ready to upgrade now.
Should you upgrade now? There are certainly many great reasons to upgrade but a word of caution before you proceed.
Now may be the perfect time for a conversation about upgrading your Windows operating system. This newsletter is designed to make you pause and give serious deliberation to your decision to implement the Windows 10 operating system at this time. As a Microsoft business partner we certainly see the benefits to Windows 10 for many people, but some businesses may want to take more time and do more planning because once you upgrade there is no turning back. (Well, you can downgrade, so long as you have not deleted the windows.old folder. Users have a month to go back without any change in files, on best case installations.)
As you probably know, Microsoft is offering a free Windows 10 upgrade available through July of this year. Upgrading to Windows 10 seems like an easy process, with just a couple of clicks you are up and running.
The decision to upgrade should be made very carefully as it will impact your business and the performance of your IT environment. While it certainly makes sense for Microsoft’s business model and moving to Windows 10 is likely to be inevitable at some point for your business, we recommend that you take the time to more fully understand what is involved in moving from your current operating system to the new Windows 10 environment.
Here are some things to consider:
1. There are different editions of Windows 10. There’s Windows 10 home and Windows 10 Professional. If you choose the free Windows upgrade, you have no choice in the version that you will be receiving. It depends on what you’re upgrading from but in any case it may make sense financially to take advantage of the free upgrade.
2. You also have the ability to control whether your upgrade will take place automatically or manually. I recommend “manually” performing the upgrade just so you are the one in control of the process rather than be surprised the next time you turn on your PC.
3. If you are planning to purchase new PCs or notebooks, we recommend that you consider purchasing a Windows 10 PC. It might be tempting to shop for Windows 8 PCs and upgrade for free but we are not convinced this is the smartest option. Individuals should seriously consider the Windows 10 operating system. In the business world you are likely using a Windows 7 system and possibly considering upgrading for free, while it’s available. It all depends on the line of business applications your company is running.
4. As with any upgrade or downgrade plan you will want to complete a full backup of your data beforehand to avoid any potential problems.
5. Keep in mind that not all PCs can support Windows 10. Before a PC will be upgraded to Windows 10, Microsoft uses a vetting process to help insure your system can handle the upgrade. If you’re buying Windows 10 compatible hardware, then you’re going to be assured of a successful migration.
In summary, you have until the end of July of this year to take advantage of the free Windows 10 upgrade. Deciding whether or not to upgrade now is an important decision for you, especially if saving money is a consideration. To plan the upgrade you’ll need to have a strategy in place very soon.
Windows 7 and 8 are fast approaching their end of sales date for PC’s with Windows preinstalled. That means that as of October 2016, major OEM’s like Dell and HP will no longer be selling PC’s with Windows 7 or 8 preinstalled – so if you replace a PC after this date you will only be able to get one with Windows 10. Keep that in mind especially if your primary line of business application is not supported under Windows 10.
We believe Windows 10 is a solid upgrade for most users, but it’s not for everyone just yet. In some cases, if your primary business software is not compatible with Windows 10 then it may not be for you at all.
Below is a chart showing the Microsoft Windows End of Sale lifecycle to help with planning you upgrade.
People who don’t want to pay for Netflix services can buy stolen log-in credentials on the black market for rock-bottom prices, Symantec reports.
The online security company said it found advertisements and software aimed at cheapskate streamers, though it didn’t mention the names of the shady sites and forums.
Netflix Logins For Sale. The ads, which show Netflix logins for sale for as little as a quarter each, proudly display guarantees of “freshly cracked” accounts. They also ask their “customers” not to spoil the fun by changing passwords or messing with payments, either of which would alert the paying user to the fact that their account has been breached.
It is, of course, illegal — these are stolen accounts, gathered through nefarious means like malware and phishing. But since Netflix takes a laissez-faire approach to sharing accounts, paying users could easily be watching shows at the same time as someone who bought their login for a quarter on the Dark Web.
Netflix CEO Reed Hastings has said in the past that he doesn’t consider password sharing a big problem, and as long as the user base keeps growing (the service just passed 65 million subscribers globally), this common practice is likely to stay that way
Sharing your Netflix log-in? Turns out you might not be the only one who lets a friend or family member log into your Netflix account. In fact, if you don’t, you’re in the minority, according to a poll of over 5,000 Netflix users conducted by Global Web Index.
Only 35 percent of users claimed to be the sole user of the account — 30 percent shared it with one other person, 16 percent with two people, and 19 percent shared it with three or more.
Netflix has plans that permit multiple streams to multiple screens at once, which means they’re fine with accounts being shared to a certain degree. Two spouses and a kid watching a movie shouldn’t require three accounts, of course — but spreading the login among four or five friends might be something the company would like to stop.
Could your account be on one of these lists? It’s hard to say, but one easy way to check is to look at your recently watched shows. If you see a lot you don’t recognize and don’t seem like your style (or that of anyone you share with), you might want to change your password. That simple action will immediately stop your account from being used by others without your permission.
DARPA challenges researchers to link human brains with computers.
The United States Defense Advanced Research Projects Agency, or DARPA, last week announced a new program that aims to build a connection between the human brain and the digital world. To achieve the goals of the Neural Engineering System Design program, DARPA has invited proposals to design, build, demonstrate and validate a human-computer interface that can record from more than 1 million neurons and stimulate more than 100 thousand neurons in the brain in real time.
The interface must perform continuous, simultaneous full-duplex interaction with at least 1,000 neurons — initially in regions of the human auditory, visual, and somatosensory cortex.
Devices created for the NESD project might be used to compensate for sight or hearing deficits, DARPA suggested, as well as other possible applications.
DARPA will award up to $60 million in funding, depending on the quality of proposals received, the successful achievement of milestones, and the availability of funds. Multiple awards are expected.
DARPA is seeking innovative, not incremental, research proposals. A successful NESD device will leverage significant advances in disciplines including microelectronics, photonics, scalable neural encoding, and processing algorithms.
DARPA would like a single device measuring one cubic centimeter — the size of two nickels stacked — that can perform the read, write and full-duplex functions desired. It will consider designs that embody those capabilities separately in devices of that size.
The devices must be secure to prevent spoofing, tampering, or denial-of-service attacks. DARPA will help proposers work on security issues.
Ultimately, NESD’s aim is to develop a modular, scalable interface that can serve multiple applications to monitor and modulate large-scale activity in the central nervous system.
Proposed devices must not require external links or connectors for powering or facilitating communications with computers.
Hardware components must be modular. They must have clear, well-defined hardware interconnect and software APIs that easily accommodate upgrades to componentry, as well as new neural signal transduction modalities or algorithms, so they can be used for future R&D.
The NESD program will require scientific and technical advances in two major technical areas: neural transducers and algorithms; and hardware, prototyping and manufacture.
“The point of this solicitation is to see what proposers think the best solution to design questions such as this are,” said DARPA Senior Policy Advisor Rick Weiss.
The NESD program’s expected to run in three phases over a four-year period.
The Rationale for a Brain-Computer Interface
The brain is probably the last medical threshold we haven’t been able to cross with medical devices. Treating a lot of degenerative disorders — whether related to pain, Parkinson’s disease, mental health, or vision problems — with drugs hasn’t necessarily always worked.
The brain is just a circuit, and if you can interface with it with microelectronics and address issues, that can be a significant improvement in the quality of life.
Keeping Brain Implants Secure
The research will be performed initially in closed-loop systems, eliminating security concerns. Any research beyond that will have to demonstrate adequate security provisions and include appropriate audits.”
Whether NESD devices can be as secure as DARPA hopes is not certain, as hackers have repeatedly defeated cybersecurity measures.
More Than Tech
“I do have concerns that you come up with a device that’s a complicated chip with a lot of capabilities, and don’t address the question of how to train the brain to interface with that,” commented Aron Seitz, a professor of psychology at UC Riverside, who trains disabled people in the proper use of their prosthetics.
It took experts 10 to 20 years to realize that hearing-disabled people who had received cochlear implants didn’t know how to understand the signals, and there’s huge emphasis now on training people how to understand those signals.
Watch my Amazon store for a special deal on “Aluminum Foil Helmets”!
The “Internet of Things” security is badly broken and getting worse. The Shodan search engine is only the latest reminder of why we need to fix IoT security.
Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams.
The feed includes images of marijuana plantations, back rooms of banks, infants and children in their homes, kitchens, living rooms, garages, ski slopes, swimming pools, colleges and schools, laboratories, and cash register cameras in retail stores. The cameras are vulnerable because they use the Real Time Streaming Protocol (RTSP, port 554) to share video but have no password authentication in place. Shodan crawls the Internet at random looking for IP addresses with open ports. If an open port lacks authentication and streams a video feed, the new script takes a snap and moves on.
While the privacy implications here are obvious, Shodan’s new image feed also highlights the dismal state of IoT security, and raises questions about what we are going to do to fix the problem.
Of course insecure webcams are not exactly a new thing. The last several years have seen report after report hammer home the point. In 2013, the FTC sanctioned webcam manufacturer TRENDnet for exposing “the private lives of hundreds of consumers to public viewing on the Internet.” Today it’s estimated that there are now millions of such insecure webcams connected and easily discoverable with Shodan. That number will only continue to grow.
So why are things getting worse and not better? Webcam manufacturers are in a race to gain market share. Consumers do not perceive value in security and privacy and have not shown a willingness to pay for such things. As a result, webcam manufacturers slash costs to maximize their profit, often on narrow margins. Many webcams now sell for as little as $20.
The problem: Consumers are saying we’re not supposed to know anything about this cybersecurity stuff and the manufacturers don’t want to lift a finger to help users because it costs them money.
If consumers were making an informed decision and that informed decision affected no one but themselves, perhaps we could let the matter rest. But neither of those conditions are true. Most consumers fail to appreciate the consequences of purchasing insecure IoT devices. Worse, such a quantity of insecure devices makes the Internet less secure for everyone. What botnet will use vulnerable webcams to launch DDoS attacks? What malware will use insecure webcams to infect smart homes? You may remember in November the story about a 2008-era malware – Conficker.B affects police body cams in 2015, it threatens not just the reliability of recorded police activity but also serves as a transmission vector to attack other devices.
The bigger picture here is not just personal privacy, but the security of IoT devices. As we expand that connectivity, when we get into systems that affect public safety and human life—medical devices, the automotive space, critical infrastructure—the consequences of failure are higher than something as shocking as a Shodan webcam peering into the baby’s crib.
FTC to the Rescue? When it comes to strong-arming manufacturers, government entities like the US Federal Trade Commission (FTC) may be able to help. Maneesha Mithal, associate director of the FTC’s division of privacy and identity protection, was quick to mention several examples where the organization went after at-fault companies. In recent years according to Mithal, the FTC has prosecuted more than 50 cases against companies that did not reasonably secure their networks, products, or services.
The FTC takes action against companies engaged in deceptive or unfair business practices, she explained. That includes IoT manufacturers who fail to take reasonable measures to secure their devices.
In addition to the enforcement action against TRENDnet, the FTC also issued security best practices for IoT manufacturers back in January 2015, urging them to build in security at the design phase rather than bolting it on as an afterthought. These practices could be a “defense-in-depth” strategy to mitigate risks, pushing security patches to connected devices for the duration of the product life cycle, and so on.
As consumers of IoT products it’s our responsibility to learn about the individual security and password settings for the devices we use and secure them to the best of our ability. Just don’t rely on the manufacturer to protect you – they probably won’t.
Data Privacy Day – January 28, 2016
Data Privacy Day (DPD) is an effort to empower people to protect their privacy, control their digital footprint and escalate the protection of privacy and data as everyone’s priority. Held annually on January 28th, Data Privacy Day aims to increase awareness of privacy and data protection issues among consumers, organizations, and government officials. DPD helps industry, academia, and advocates to highlight consumer privacy efforts.
Data Privacy Day began in the United States and Canada in January 2008 as an extension of the Data Protection Day celebration in Europe. Data Protection Day commemorates the January 28, 1981, signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. Data Privacy Day is now a celebration for everyone, observed annually on Jan. 28.
Data Privacy Day is led by the National Cyber Security Alliance, a non-profit, public private partnership focused on cyber security education for all online citizens. StaySafeOnline.org has many resources to help you, your family and your business stay safe online.
Free Security Check-Ups Check your computer for known viruses, spyware, and discover if your computer is vulnerable to cyber attacks.
Check Your Privacy Settings One-stop shop for easy instructions to update your privacy settings wherever and however you go online.
Parent Resources Information regarding cyberbullying, child identity theft, Facebook for parents, social networking, etc.
Educator Resources Prepared educational materials for the classroom, K – 12th grades.
Business Resources Informational resources for businesses regarding bring your own device, information security, document destruction, compliance, data breach, and risk management. https://www.staysafeonline.org/data-privacy-day/business-resources
Privacy and Domestic Violence Resources for domestic violence survivors and victims to help safeguard the privacy of their personal information.
If you’ve not already heard, or have somehow forgotten over the long holiday, next week marks a significant milestone for Microsoft’s Internet Explorer web browser. Next week, along with the first Patch Tuesday of 2016, Microsoft will stop supporting Internet Explorer versions 8, 9, and 10. This means that after January 12, 2016, Microsoft will no longer supply security updates for these versions.
Don’t know how to check what version you have? Simply click the “tools” icon in the top right corner of your screen and then click “About Internet Explorer”
For those clinging to the old versions, a new patch (KB3123303) delivered during Patch Tuesday will install a nag notification to warn users about the lack of support and offer an upgrade to Internet Explorer 11 (where applicable).
Microsoft really wants folks to either move to Internet Explorer 11, or Windows 10 and Microsoft Edge in an effort to stay secure on the web. Unfortunately, even though Microsoft is touting a 200 million active device milestone for Windows 10, customers may not be as accepting of the new web browser built into the latest OS.
Microsoft Edge was supposed to be the future of web browsers with a sleek and fast interface. But, as it exists today, Edge is buggy and temperamental and is a huge black mark on an ever improving OS. Recent browser stats show that customers may be using the exit of IE 8, 9, and 10 from supportability as a way to migrate to Chrome and Firefox. Not really what Microsoft intended. In December, Internet Explorer dipped below the 50% usage mark, while Chrome is creeping closer to taking the number 1 spot. Edge has only been able to garner a paltry 2.3% share.
If you have any questions about updating your Internet Explorer browser just give us a call and we’ll be happy to help you! 781-826-9665