22 Sep, 2024

New Mad Liberator gang uses fake Windows update screen to hide data theft

A new data extortion group tracked as Mad Liberator is targeting AnyDesk users and runs a fake Microsoft Windows update screen to distract while exfiltrating data from the target device. The operation emerged in July and although researchers observing the activity did not seen any incidents involving data encryption, the gang notes on their data leak […]

2 mins read

Top Reasons for Loud Computer Fans and How to Fix

Is your computer’s fan making a lot of noise? The culprit behind a noisy fan is usually dust buildup or hardware problems (ie- the fan is wearing down and about to die). Sometimes you can also have something getting in the way of the fan blades, like a cable or wire that has made its […]

10 mins read

Microsoft Edge PDF reader is getting more Copilot AI features

Microsoft is improving Copilot integration in the Edge browser with AI-powered smart keywords. This will allow the AI to generate important keywords from the PDF and then help you analyze each topic.  Copilot in Edge already lets you summarize all types of documents, including PDFs. You can open any PDF in the Edge and interact with […]

1 min read

How to Recycle Old Computers

Recycling computers is important because it helps protect the environment and keeps harmful materials out of landfills. There are convenient ways to safely get rid of old devices. You can take your old computer to electronics stores, recycling centers, or use mail-in programs. Old computers contain valuable materials, but they also have hazardous substances that can harm […]

7 mins read

Windows 11 will give you greater control over HDR features

Microsoft has released Windows 11 Build 27686 with some hidden HDR-related changes. As noticed by Phantom on X, one of the hidden features is the ability to “allow HDR video streaming even when HDR is off.” As the name suggests, this basically allows you to stream HDR content without enabling HDR for the entire system. Additionally, the “HDR video […]

1 min read

National Public Data confirms breach exposing Social Security numbers

Background check service National Public Data confirms that hackers breached its systems after threat actors leaked a stolen database with millions of social security numbers and other sensitive personal information.  The company states that the breached data may include names, email addresses, phone numbers, social security numbers (SSNs), and postal addresses. Breach linked to late […]

3 mins read

Why the Moto G45 5G is the Best Budget Phone: 7 Reasons to Upgrade

Recently, Motorola confirmed that it will announce the Moto G45 on Aug. 21 in India. The pricing of the device seems to be lower than that of the Moto G64 5G, which currently starts at Rs 13,999 in the country. Flipkart has updated the G45’s landing page. It now mentions the top reasons to purchase the device. Here is […]

2 mins read

How to Fix a Laptop That Won’t Charge: Top Tips & Solutions

If your laptop won’t charge, it can be frustrating and disruptive. This could be due to a broken charger, a bad battery, or a faulty power port. First, check the power cord and outlet. Many charging issues can be resolved with simple troubleshooting steps. Try using a different power outlet or swapping the charger. Look at […]

7 mins read

Microsoft disables BitLocker security fix, advises manual mitigation

Microsoft has disabled a fix for a BitLocker security feature bypass vulnerability due to firmware incompatibility issues that were causing patched Windows devices to go into BitLocker recovery mode. Tracked as CVE-2024-38058, this important severity security flaw can let attackers bypass the BitLocker Device Encryption feature and access encrypted data with physical access to the targeted […]

2 mins read

NIST releases first encryption tools to resist quantum computing

The U.S. National Institute of Standards and Technology (NIST) has released the first three encryption standards designed to resist future cyberattacks based on quantum computing technology. The agency encourages system administrators to start the transition to the new algorithms as soon as possible, since timely adoption is paramount for protecting sensitive information from attackers with a […]

3 mins read