Realign the Start Button
The first thing that will jump out at you is the placement of the Start button. Long located in the lower-left corner of the screen, it’s now centered with the rest of the icons on the taskbar. But don’t worry, you can change it back.
Right-click the taskbar and open Taskbar Settings. Select the Taskbar Behaviors drop-down and change Taskbar Alignment to Left.
Your taskbar icons move to the left and the Start button goes back where it belongs. For more on personalizing the Windows 11 taskbar, check out our guide.
Add More Options to Your Right-Click Menu
The right-click menu now focuses only on the most important settings. Should you need more settings—print, set a new background, or view the full file location, for instance—select Show more options to open a spill-over menu.
Customize the Quick Settings Panel
Windows 11 separates the Quick Settings that appear in the Action Center in Windows 10 from that panel’s notifications. Click the area of the taskbar that has Wi-Fi, speaker, and, battery icons to open a settings menu that lets you control Wi-Fi, Bluetooth, airplane mode, battery-saver mode, and more. To add or remove settings buttons, click the pencil-shaped Edit quick settings button. Unpin what you don’t want or click Add to make new features accessible from the Quick Settings menu.
Add Tabs to File Explorer
A top feature added in the Windows 11 22H2 update is that File Explorer finally gets tabs like its macOS counterpart Finder has had for years. Having tabs saves you from littering your desktop with multiple File Explorer windows when you need to view more than one at a time. Just right-click on a folder and choose Open in New Tab, like you would in a web browser.
Pro tip: You can drag a file between tabs. Just drag it to the desired tab and then down into the file list for that tab. Also as with a web browser, you can drag tabs sideways to rearrange them and hit Alt-Left Arrow to navigate back in a tab.
With the initial Windows 11 release, Microsoft streamlined the ribbon at the top of the File Explorer menu. Cut, Copy, Paste, Rename, Share, Delete, Sort, and View choices get prominent buttons at the top, saving you from having to wade through multiple menus you seldom use. Windows 11 also adds a New button for creating new folders and shortcuts, as well as documents based on the programs you have installed. The buttons displayed change based on context, too, so, for example, when you’re searching in the right-hand search box, you get a Search Options button.
Check out this cool list of tech gadgets. Something for everyone, but especially for the techies
Google announced today that the Google Chrome web browser will likely drop support for Windows 7 and 8.1 starting February 2023.
After support is discontinued for these two Windows versions, the company says Chrome users must ensure that their devices are running at least Windows 10.
“With the release of Chrome 110 (tentatively scheduled for February 7th, 2023), we’ll officially end support for Windows 7 and Windows 8.1,” Google Chrome Support Manager revealed.
“You’ll need to ensure your device is running Windows 10 or later to continue receiving future Chrome releases.”
Google’s decision to drop support for these platforms matches Microsoft’s Windows lifecycle policy, which lists the Extended Security Update (ESU) program for Windows 7 and the Windows 8.1 end of support on January 10, 2023.
Currently, Windows 7 is still running on over 10% of all Windows systems worldwide, while Windows 8.1 is just 2.7%, according to Statcounter GlobalStats.
The Google Chrome web browser has a market share of over 65%, followed by Safari with roughly 18% and Microsoft Edge with 4.32% (which uses the Chrome rendering engine with enhancements from Microsoft).
Users advised to upgrade
Even though older Google Chrome versions will work even after support is dropped on Windows 7 / 8.1, Google advises users to upgrade their systems to keep receiving security updates.
This matches Microsoft’s advice for customers with systems running Windows versions out of support which no longer receive technical assistance or software updates, exposing their computers and data to security risks.
“Older versions of Chrome will continue to work, but there will be no further updates released for users on these operating systems,” the Google employee added.
“If you are currently on Windows 7 or Windows 8.1, we encourage you to move to a supported Windows version before that date to ensure you continue to receive the latest security updates and Chrome features.”
Story from Daily Caller
Chinese firms that relied on advanced American chips for artificial intelligence research may be forced to do without after American chipmakers disclosed new regulations imposed by the U.S. government restricting the sale of their most advanced chips to China, Reuters reported.
The new regulations restrict the sale of Nvidia’s A100 and H100 AI chips, alongside competitor Advanced Micro Devices’ (AMD) MI250, which have applications ranging from language processing in consumer cellphones to satellite image processing and signal filtering for military intelligence applications, according to Reuters. Buyers of the A100 chip include the National University of Defense and Technology, a self-described “military university” under the control of the Chinese military, alongside a slew of other government-affiliated institutions and universities, Reuters reported.
Despite the fact that China produces most of the world’s semiconductors, domestic firms are unable to produce the advanced chips necessary for AI research like their American counterparts, according to Reuters. Aside from high-end chips, public records show a reliance on less advanced chips from Nvidia and U.S.-based chipmaker Intel across an array of Chinese research institutions, Reuters reported.
Affected Chinese organizations may be forced to utilize cloud technology to develop their AI research on servers operated by Google or Amazon, before exporting the relevant software back to China, Reuters reported. Alternatively, a large number of weaker chips not affected by the new regulations could stand in for smaller collections of more powerful chips, according to Reuters.
In October 2021, Tsinghua University, the highest-ranked university in China globally, spent $400,000 on a pair of supercomputers, powered by a combined eight A100 chips, according to Reuters. Also in October 2021, a pair of colleges affiliated with the Chinese Academy of Sciences spent a combined $450,000 on a series of computers for artificial intelligence research, powered at least in part by A100 chips, Reuters reported.
Nvidia had $400 million in outstanding “potential sales” to Chinese customers as of last Wednesday, according to the Nvidia quarterly report that revealed the new regulations. Nvidia told the Daily Caller News Foundation in a statement that it was working with Chinese customers to find replacement products, and if that was insufficient, seeking exemptions from the U.S. government, reiterating a statement it gave when the news broke last week.
Nvidia said that the regulations may force the transition of “certain operations out of China,” according to its quarterly report.
As long as social media platforms have been around, there have been hackers attempting to take control of accounts. Remember MySpace? My friends’ page for their band was hacked a number of times, sometimes by malicious strangers, sometimes by overzealous fans. Back then, if a hacker got into your MySpace account, they had access to your friends’ list, private messages, photos, and blog posts. It was a lot, but it’s nothing like the treasure trove of information many of today’s social media accounts contain.
Facebook accounts often contain your real name, email address, birth date, relationship status, and physical address. In addition to storing all your private messages, photos, and feed posts, Facebook is also used to log in to other websites. If a hacker manages to take over your Facebook account, they may have access to some of your other accounts around the web. The same goes for Instagram, which is also owned by Meta.
What Hackers Want
Criminals need all your personally identifiable information (PII) to commit identity fraud or to sell your account to the highest bidder. According to a report from Privacy Affairs(Opens in a new window), the cost of a Facebook account on the dark web is $45. An Instagram account goes for $40.
According to the Identity Theft Resource Center(Opens in a new window) (ITRC), the internet safety organization received nearly 500 social media account takeover reports in the first three months of 2022. That’s up from the 320 the ITRC received in 2021. Experts at the organization say criminals are committing Instagram scams by posing as a “friend” of the victim. The hacker lures in their victim with an email or a private message stating they need help getting back into their Facebook or Instagram account. The hacker sends a malicious link in their message, and when the victim clicks on it they lock themselves out of their account and give access to the hacker.
How to Avoid a Social Media Account Hack
The demand for hacked social media accounts is high. Don’t let yourself be caught off guard by a scammer. Take the following steps to keep your account locked down and secure.
- Never click on any links sent to you until you verify they’re from someone you know. If a friend sends you a message that contains a link, attachment, or file, reach out to the friend via a phone call or video chat to make sure they sent you the message.
- Avoid sharing your personal information with anyone. Scammers build trust with their victims in the hope that they’ll hand over PII. This is especially common in dating scams. You should never share passwords, PINS, codes, or any other type of sensitive information with someone you’ve never met in person.
- Use multi-factor authentication and a strong and unique password on your account. You should also store the password in a password manager. Consider using a hardware security key to protect your accounts that contain the most PII.
- Stop downloading third-party apps within a social media platform. If third-party apps have your information, you may not know where or how it’s being stored. It is another place for hackers to get their hands on your valuable social account credentials. Only download applications from recognized stores, such as the Apple App Store, Google Play, and Microsoft Store.
- Don’t talk to strangers. Isn’t the free exchange of ideas the point of the internet? Maybe it was at one time, but these days, answering a private message from a person who doesn’t have any shared friends with you could be a setup for a phishing scam.
What to Do If Your Instagram Account Gets Hacked
If you believe your Instagram account has been hacked, here are six steps to take.
- Check your email account for a message from Instagram. If you received an email from firstname.lastname@example.org that says your email address was changed, you might be able to undo this change by selecting “revert this change” in that message. If additional information was also changed (like your password), and you’re unable to change back your email address, request a security code from Instagram.
- Request a login link from Instagram. To help Instagram confirm that you own the account, you can request that they send a login link to your email address or phone number. To make a request, visit the login screen, and tap Get help logging in (Android) or Forgot password (iPhone).
- Enter the username, email address, or phone number associated with your account, then tap Next. If you don’t know the username, email address, or phone number associated with your account, tap “Need more help?” and follow the on-screen instructions.
- Select either your email address or phone number, then select Send Login Link.
- Click the login link in your email or a text message (SMS) and follow the on-screen instructions.
- Request a security code or support from Instagram. If you’re unable to recover your account with the login link sent to you, you may be able to request support for your hacked Instagram account. For more information on how to do this, visit Instagram’s Help Center for step-by-step instructions.
Taking a screenshot on your Android device sounds like a simple task. You just hit a few buttons and the screen is saved to your phone. However, Android devices are not as uniform as iPhone, so methods can differ depending on the device manufacturer and OS version you’re running.
Phones from Samsung, Google, Motorola, and OnePlus all have built-in screenshot capabilities. And if you’re running the most recent version of the Android operating system, you get even more features. Here’s how to take a screenshot on your Android phone.
How to Take a Screenshot on Any Android Phone
Google Pixel 4a 5G (Credit: Steven Winkelman)
Most recent Android devices have standardized the screenshot action to pressing the Power and Volume Down buttons simultaneously. Others may have you press down on the Power button, then select Screenshot from the menu.
On a Pixel phone, you can swipe up from the bottom of the screen to open your recent apps, then tap Screenshot to capture the current app. Older phones with a physical home button on the front may require you to press the Power and Home buttons together.
If your phone has Google Assistant, you can use a voice command to ask it to take a screenshot for you. Say something like “OK Google, take a screenshot” and the action is completed.
Samsung Galaxy S22 Ultra with S Pen (Credit: Molly Flores)
For Samsung Galaxy devices using the S Pen stylus, you can hold down the button on the S Pen and scribble across the screen to take a screengrab. Another way is to remove the pen from the phone and tap Smart Select from the menu. You can then choose between a square, free, or circle capture area, then draw to capture the screen.
There will be a “flash” on the screen and the sound of a shutter (if you have the sound on), then the shot should show up in your photo library.
Scammers have been exploiting deepfake technology to impersonate job candidates during interviews for remote positions, according to the FBI.
The agency has recently seen an increase in the number of complaints about the scam, the FBI said in a public advisory(Opens in a new window) on Tuesday. Fraudsters have been using both deepfakes and personal identifying information stolen from victims to dupe employers into hiring them for remote jobs.
Deepfakes involve using AI-powered programs to create realistic but phony media of a person. In the video realm, the technology can be used to swap in a celebrity’s face onto someone else’s body. On the audio front, the programs can clone a person’s voice, which can then be manipulated to say whatever you’d like.
The technology is already being used in YouTube videos to entertaining effect(Opens in a new window). However, the FBI’s advisory shows deepfakes are also fueling identity theft schemes. “Complaints report the use of voice spoofing, or potentially voice deepfakes, during online interviews of the potential applicants,” the FBI says.
The scammers have been using the technology to apply for remote or work-from-home jobs from IT companies. The FBI didn’t clearly state what the scammers’ end goal. But the agency noted, “some reported positions include access to customer PII (personal identifying information), financial data, corporate IT databases and/or proprietary information.”
The ChromeLoader malware is seeing an uptick in detections this month, following a relatively stable volume since the start of the year, causing the browser hijack to become a widespread threat.
ChromeLoader is a browser hijacker that can modify the victim’s web browser settings to show search results that promote unwanted software, fake giveaways and surveys, and adult games and dating sites.
The malware’s operators receive financial gains through a system of marketing affiliation by redirecting user traffic to advertising sites.
There are many hijackers of this kind, but ChromeLoader stands out for its persistence, volume, and infection route, which involves the aggressive use of PowerShell.
macOS targeted too
The operators of ChromeLoader also target macOS systems, looking to manipulate both Chrome and Apple’s Safari web browsers.
The infection chain on macOS is similar, but instead of ISO, the threat actors use DMG (Apple Disk Image) files, a more common format on that OS.
Moreover, instead of the installer executable, the macOS variant uses an installer bash script that downloads and decompresses the ChromeLoader extension onto the “private/var/tmp” directory.
Credit Story Bleeping Computer
The IT industry is taking another big step toward embracing password-less technology. Three major companies—Apple, Google, and Microsoft—are adopting a new login system that ditches passwords and relies on your smartphone or laptop to authenticate your sign-ins.
“This will simplify sign-ins across devices, websites, and applications no matter the platform — without the need for a single password,” Google said in the announcement. “These capabilities will be available over the course of the coming year.”
Google has been among the vendors pushing the tech industry to drop passwords for simpler, more secure ways to grant login access. To do so, the company has been using the smartphone as a way to authenticate a user’s login. Rather than type in a password, you can simply go to your phone and unlock access to the internet account on your PC. From there, the Android phone can sign an authentication request via Bluetooth to the PC, logging you in.
The problem is that current password-less approaches don’t always work from one hardware platform to another. Functionality can also be lost if you’re signing in from a new device.
To fix this, Apple, Google, and Microsoft plan on adopting an upgraded password-less login method called “multi-device FIDO credential,” which is designed to work across platforms.
The system comes from the FIDO Alliance, a consortium of companies that have been working on standards and protocols around dropping passwords. “Until now, users were required to enroll their FIDO credentials for each service on each new device, typically with a password for that first sign-in. With multi-device FIDO credentials, the credentials are available to users whenever they need them—even if they replace their device,” the Alliance said.
Credit PC Magazine for the Story