Author: admin

ComputerWorldIndependent

Android 12 Upgrade Report Card: What a weird year

Credit to Author: JR Raphael| Date: Tue, 05 Apr 2022 03:00:00 -0700

In the world of software, six months is an eternity.

Heck, look at how much has happened over the past six months since Android 12 came into the universe. Google started and then finished a hefty 0.1-style update that lays the groundwork for significant large-screen improvements to the Android experience. And it’s now well into the public development phase of its next big Android version, Android 13 — which is the rapidly forming release on most folks’ minds at this point.

To read this article in full, please click here

Read More
MicrosoftSecurity

SpringShell RCE vulnerability: Guidance for protecting against and detecting CVE-2022-22965

Credit to Author: Paul Oliveria| Date: Tue, 05 Apr 2022 01:11:24 +0000

Microsoft provides guidance for customers looking for protections against exploitation and ways to detect vulnerable installations on their network of the critical vulnerability CVE-2022-22965, also known as SpringShell or Spring4Shell.

The post SpringShell RCE vulnerability: Guidance for protecting against and detecting CVE-2022-22965 appeared first on Microsoft Security Blog.

Read More
ComputerWorldIndependent

The Russian cyberattack threat might force a new IT stance

Credit to Author: Evan Schuman| Date: Mon, 04 Apr 2022 09:20:00 -0700

There’s a lot of fear of possible Russian cyberattacks stemming from Russia’s attempted takeover of Ukraine. Perhaps the biggest worry —and quite possibly the most likely to materialize — is that these cyberattacks will likely be finely tuned as retaliation for US financial moves against the Russian economy. 

The cyberattacks would be designed not to steal money or data per se, but to harm the US economy by strategically hitting major players in key verticals. In other words, the Russian government might say, “You hurt our economy and our people? We’ll do the same to you.”

Thus far, there’s no evidence of any large-scale attack, but one could be launched at any time. 

To read this article in full, please click here

Read More