Google has ditched plans to block third-party cookies in the Chrome browser. It says it will instead let users "make an informed choice" - a change that's upset privacy campaigners. A cookie is a text file placed by a website on a user's computer. ... The site can then retrieve information from the file the next time the user visits, for example to log them into an account or to provide a personalized website experience such as a localized weather forecast. Many cookies are "first party," meaning they only collect and store data about a user's activity on the site which issued the cookies. ... (view more)
Featured Articles
Quantum computers could be practical in just three years from now according to a manufacturer. The technology could transform the speed and capability of computers. Oxford Ionics says it has not only produced a quantum computer chip with twice the ... performance of any existing chip, but that it could mass-produce its new design without needing specialist facilities. The idea of quantum computing has been explored for many years and aims to overcome one of the biggest limitations of traditional computing. Ultimately existing computers simply store data as either a 0 or a 1 (a bit), usually ... (view more)
Google has significantly scaled back its use of AI-generated "answers" on its search results page. It's also sourcing less of the "facts" from discussion forums such as Reddit. The changes are to the "AI Overview" feature, which replaced a similar ... feature called "Search Generative Experience". In both cases, it meant Google creating text that appeared at the top of the search results page, ahead of the normal list of links to relevant websites. The feature is primarily designed to answer questions without the need for the user to visit a website. The "answers" are a summary of information on ... (view more)
Reports that hackers have got their hands on 10 billion passwords have been slightly overblown. The file includes passwords up to 20 years old and many may never have been used at all. The "leak" involves an online post of a text file dubbed ... "RockYou 2024" which is said to contain 9,948,575,739 unique passwords, all stored in plain text. It appears to be an update from a similar file published in 2021, with "only" 1.5 billion of the passwords added since that time. Cybernews estimates it contains passwords compiled from around 4,000 databases over the past 20 years. (Source: cybernews.com ) ... (view more)
Infopackets Reader William B. writes: " Dear Dennis, I am running a server virtual machine inside of Virtualbox and it's been quite slow. I've read that VMware Workstation has twice the performance (roughly). Out of curiosity, I tried to export my ... current virtual machine in Virtualbox using the Open Virtualization Format (.OVF or .OVA) but I get an error every time I try to export: ' Could not create the exported medium Server-disk001.vmdk (VERR_IO_CRC) .' I am not sure what to do and would like to export this virtual machine off of Virtualbox so I can give VMware Workstation a try. " My ... (view more)
Microsoft has competition in the market for extending Windows 10 after its scheduled end of life. An independent company is promising simple-to-use security updates - with a cost. Officially, Microsoft will stop issuing free security updates for ... Windows 10 after October 14, 2025, just over 10 years after the system was released. That's not got a great reaction given Microsoft heavily implied there would be no new version after 10, and that it has arguably made Windows 11 an unnecessarily difficult upgrade through new hardware security requirements. If all goes to plan, anyone wanting to keep ... (view more)
Microsoft says Russian hackers accessed its customers' emails during an attack earlier this year. It had previously only said Microsoft's own staff were victims. The company has not yet said how many customers are affected but says it has contacted ... them with details of the attack. Microsoft was breached by a group called Midnight Blizzard, believed to operate from Russia. The government there has not commented on the claims. The new revelations follow a Microsoft announcement in January that a small proportion of its corporate email accounts had been accessed by Midnight Blizzard. The attacks ... (view more)
Infopackets Reader Jack L. writes: " Dear Dennis, For the last 4-5 months when I try to do a Windows 10 update to download and install ' 2024-01 Security Update for Windows 10 Version 22H2 for x64 based Systems ' ( KB5034441 ) the update downloads, ... but when it starts to install (before I restart the computer) it constantly gives the following error code ( 0x80070643 ). Are you able to remedy this problem? " My response: I asked Jack if he would like to use my remote desktop service , and he agreed. Below I will discuss my findings. How to Fix: 2024-01 Security Update for Windows 10 Fails to ... (view more)
Infopackets Reader Drew W. writes: " Dear Dennis, I was randomly added by a female on Snapchat and she asked me what I looked like. We hit it off, and then she asked for some inappropriate photos of myself. A few minutes later, she showed me ... pictures of my Instagram follower and said if I didn't pay, they would be sent to my followers. I have already sent $400 and was provided video proof of my photos being deleted. However, she is now demanding another $100 to 'delete for good', whatever that means. I already received SMS text messages from 4 other phone numbers demanding higher amounts. ... (view more)
The next version of Android will make it easier to diagnose performance and hardware issues. It will remove the need to use hidden codes. The changes are coming to Android 15, which is expected to roll out in finished form in August. Google has just ... released the third beta testing version of the update and testers have noticed a new feature in the System section of the Settings app. Labeled "Device diagnostics", the feature has two elements. The first, "Evaluation Mode" reportedly lets users "use one device to assess another device", which sounds more useful for dedicated tech enthusiasts or ... (view more)
Facebook and Instagram's attempts to avoid users being misled by AI-generated photos have backfired. Several users report photographs they took themselves as being falsely labeled as made by AI tools. Meta, which owns both sites plus social ... discussion tool Threads, has started adding a "Made with AI" label to images. In some cases it's there because the users has ticked a box to say they used AI to make the image. In other cases, it's because Meta's detection tools have flagged the image. The site has felt pressure to clearly indicate AI-generated images that could be designed to fool and ... (view more)
A particularly embarrassing bug makes it easy to send emails that appear to be from Microsoft employees. It's bad news for the public as it could make phishing scams appear more credible. The good news is that it only works if the recipient is using ... Outlook, though "good" is a comparative term because there are over 400 million Outlook users worldwide. (Source: cyberdaily.au ) Users Asked to Remain Vigilant Exactly how the bug works and where its found still isn't known, as the security researcher says they do not want to give details that could help potential attackers exploit the bug on a ... (view more)
The makers of a low-tech phone say they want people to use it as little as possible. But they've added a "proper" screen that brings the price up to $399. The third incarnation of the Light Phone continues to raise questions about exactly who the ... intended users are, though the makers say sales have topped 100,000. (Source: techcrunch.com ) Previous versions had virtually no features: the Light Phone 2 made phone calls and accepted text messages, but had no Internet browser or installable apps. Instead it simply performed a few basic built-in tasks such as playing music files, giving driving ... (view more)
The US government is suing Adobe for allegedly tricking users into subscriptions. The Federal Trade Commission (FTC) says the company doesn't do enough to warn users about cancellation charges and makes it too hard to cancel. The court case is ... against both Adobe as a company and individually against the company's vice president and its president of digital media business. The key complaint is that Adobe has breached federal consumer protection laws and thus harmed consumers. The individuals are named because they had the authority to make decisions about Adobe's subscriptions policies. ... (view more)
This month's Microsoft "Patch Tuesday" update includes a fix for a major threat in Outlook. The bug means simply opening an email can trigger the attack. The update should have been applied to most systems by now, but some users may have shut off ... Windows Update, in which case it is recommended to re-enable and patch immediately. The threat, discovered by security company Morphisec, is a remote code execution vulnerability. That's particularly nasty as it gives an attacker the ability to remotely operate on the victim's computer. They could then spread malware, install ransomware or attempt to ... (view more)
Infopackets Reader Calli P. writes: " Dear Dennis, I we just upgraded our server machine which includes all brand new hardware. The new server hardware will act as a Hypervisor, and are currently using Virtualbox to run our 'server' virtual machine. ... After copying over the server virtual machine to the new hardware, however, Virtualbox won't boot the virtual machine, stating ' Nonexistent host networking interface , name Intel I210 Gigabit Network Connection (VERR_INTERNAL_ERROR)', with an E_FAIL error 0x80004005 . I am not sure what to do and I need help! " My response: I asked Calli if she ... (view more)
(Note that the solution below applies to any Windows 11 machine that needs to stay up and running without a reboot after updates, and not just one running VMware Workstation). Infopackets Reader Calli P. writes: " Dear Dennis, We recently upgraded ... our server machine to an AMD Ryzen 9 with 16 cores and 32 threads. The old machine was very outdated (only 4 core). The role of the new server is the same as the old - to be a Hypervisor - which runs VMware workstation. Inside of VMware Workstation is a virtual machine which we regard as the Server virtual machine, which runs our ESC software for ... (view more)
Microsoft has backtracked on a new Windows 11 feature that screenshots a computer every few seconds. "Recall" will now be an opt-in tool that doesn't work by default. The theory behind the tool is that it would be helpful for users to be able to ... find information from something they'd used or been work on, even if they couldn't remember precisely when and where. That's inherently difficult to do through ordinary file or web searches, particularly if it involves an image. Searching the contents of different file types can be slow, while searching for something that isn't text can be difficult. ... (view more)
Infopackets Reader Calli P. writes: " Dear Dennis, We own a heating and cooling business and have a server that uses a Windows 10 virtual machine on VMware workstation. The virtual machine runs a program called ESC Connections Server that allows us ... to book appointments (among other things) from our workstations and also remotely on our phones. The ESC Server and virtual machine are both mission critical. That said, I understand that Windows 10 will only be supported until October, 2025 and would like to upgrade it to Windows 11. The problem is that our virtual machine was built using the MBR ... (view more)
The latest Windows update fixes a nasty bug that could put users at risk when connected to public WiFi. An attacker could exploit it simply by using the same network. The bug, with the reference number CVE-2024-30078, is rated as "important" by ... Microsoft. That rating takes into account both how easy it is to exploit and how much damage it would do. (Source: microsoft.com ) The problem is with WiFi drivers, used to make Windows work with the hardware in a computer (usually a laptop) to connect to a wireless network. It would allow hackers to take advantage of the way Internet data is broken up ... (view more)
Google Maps is changing the way it stores Location History. It's arguably a boost for privacy but may be a surprise for some users who appreciate the feature. The change is to the timeline feature that's included in both the desktop and mobile app ... versions of Google Maps. It lets users see a complete record of all places they've visited while using a mobile device with location tracking switched on. The feature will also add detail and context, for example including any picture from a visit that are saved in Google Photos, or figuring out when a user went on a trip or vacation. It can be ... (view more)
Microsoft is inviting Windows 10 users to join a test program for new features. It's something of a surprise given the system theoretically reaches its "end of life" next year. The program is part of Windows Insider, where Microsoft lets people sign ... up to test new Windows features. The idea is to get an audience big enough to pick up problems in real world testing, but small enough that any problems aren't a major issue. Microsoft is reopening the Beta Channel for Windows 10. That's one of four Windows Insider channels: Canary, Dev, Beta and Release Preview. The first two are very early ... (view more)
Almost three billion personal data records have been stolen from a background check company. The massive breach has unintentionally proven the value of data opt-out laws. The people who stole the data had put it up for sale to other criminals for ... $3.5 million, but it seems they didn't find a buyer. They are reportedly now planning to release the data publicly. That might seem an odd move given its supposed value, but it's likely part of a long game. It means that if the same group steal data in the future, they would be able to blackmail the business with more credibility. The data is said to ... (view more)
Android scammers are using a creatively nasty way to spread malware. They've disguised it as an update for the Google Play store itself. It's a particularly cheeky way to try to get credibility for a malware scam. Not only is Google Play the ... official place to get Android apps in the first place, but the best and simplest Android security tip is to only use apps from Google Play. In this case, the malware doesn't originate as an app but instead as a bogus link. This could be on a web page, in a text message or in an email. The supposed source is Google itself and the link comes with a message ... (view more)
Some users are reporting finding it almost impossible to watch videos on YouTube while using an ad blocker. It's likely the latest attempt by YouTube to crack down, but seems to only work on specific ad blockers. Over recent months, YouTube had ... displayed a warning message to people who used an ad blocker, telling them the video would not play until they switched it off. YouTube maintains that using an ad blocker actually violates its terms of service. The company also argues that ad blocking hurts both creators and users, the logic being that without ad revenue, creators have less incentive ... (view more)
Google appears to be rethinking its use of AI generated "answers" in search results page. It comes as tech experts figured out a workaround to disable the AI generated answers in the first place. The company recently launched what it calls Search ... Generative Experience behind the scenes, and "AI Overview" in search results. It kicks in when it thinks the user is trying to get a specific answer to a specific question rather than simply searching for a website or exploring a wider topic. The AI Overview appears at the top of the results before any links to websites and is rolling out to all ... (view more)
An unprotected Windows XP machine lasted just 10 minutes online before being infected. It was an extreme and arguably unrealistic experiment, but does show just how prevalent online threats are. YouTuber Eric Parker carried out the test with a ... virtual machine running Windows XP. A virtual machine is a machine that lives inside of another machine, which makes it appear as if the virtual machine is a separate, physical computer. It's often used by people running two operating systems on the same computer. In fact, this website runs as a virtual machine. At any rate: it's no secret that running ... (view more)
More than a third of webpages have disappeared in the past 10 years according to a new study. Eight percent of pages that existed last year have already gone. The figures come from the Pew Research Center, exploring what it calls "digital decay" and ... other sources have called "link rot". (Source: pewresearch.org ) Pew's researchers looked at a random selection of URLs which were active at various points over the past 10 years. On average, a quarter have now gone. Naturally there's a downward trend, with 38 percent of pages active in 2013 now unavailable. Even with pages active as recently as ... (view more)
The FBI has taken control of a forum used for selling stolen data. The fact it's the second time BreachForums has been taken down this year shows how it may be an endless task. Such forums are arguably a key incentive for hackers to steal data in ... the first place. The forums make it easier to find buyers for the stolen data, rather than the hackers having to figure out their own tactics for exploiting the stolen information. BreachForums was also a key marketplace for selling malware used for successful hacking attacks. High-profile data offered for sale on the site in recent months included ... (view more)
It's no surprise TikTok has challenged a law that bans it operating in the US under Chinese ownership. But what wasn't expected was individual users suing to block the law. The US government recently passed a law giving TikTok's Chinese-based owners ... ByteDance until January 19, 2025 to sell to a non-Chinese company. If it doesn't, app stores will be barred from distributing the app and hosting companies would not be allowed to serve the business. TikTok says the deadline is so short and the conditions so strict that the law is effectively an outright ban. It's already started a legal challenge ... (view more)
Need Help? Ask!
![](/graphics/dennisfaas.jpg)
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 20 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
![](/graphics/dennisfaas.jpg)
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 20 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
![](https://www.infopackets.com/graphics/bbb.png)
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.