restrict settings
additional restrictions: Security
The Fall Creators Update could witness some popular legacy features getting axed. (Source: Windows Central)

Paint and other legacy features to get axed in the Windows 10 Fall Creators Update

The upcoming feature update to Windows 10, the Fall Creators Update, will see many legacy features in Windows getting removed or deprecated: the most noticeable among them being the classic Paint program, System Image Backup and screensaver functionality, amongst others.
Virus infections are relatively rare on Android, but the risk increases when the user allows side loading of apk files. (Source: gfkDSGN/Pixabay)

Android antivirus software relatively easy to beat

Researchers at Georgia Tech were able to bypass the protection of 97% of the popular Android antivirus applications tested. The detection rules used by most of the programs appear to be relatively basic, and by presenting their results at the Black Hat USA 2017 conference, the researchers are hoping that developers can improve the performance of their scanne...
Vintage Intel Atom processors are officially off Microsoft's update radar. (Source: Hexus)

No Creators Update and beyond for Intel 'Clover Trail' Atom CPUs going forward, says Microsoft.

Microsoft has officially ended availability of Windows 10 feature updates post the Anniversary Update for tablets and laptop hybrids featuring Intel's 'Clover Trail' Atom chips owing to end of interactive support for these processors from Intel.
Chinese security forces in Xinjiang are reportedly checking residents for whether or not they have installed the spying app. Failure to have the app installed can lead to up to 10 days detention. (Source: Twitter/即时中国大陆映像)

Some Chinese residents forced to install government spyware on phones

The Chinese government has made the installation of surveillance software on phones mandatory in the north-western city of Urumqi. Urumqi is the capital of Xin Jiang province, which is home to most of China's Turkic Uighur minority.
The OnePlus 5 has had a bug-filled launch. (Source: OnePlus)

Some users report OnePlus 5 crashes when dialing 911

There is new concern shown by OnePlus 5 owners as allegations appear on reddit of phones rebooting when dialing 911. The cause of the bug is currently unknown, however OnePlus is in contact with those experiencing the issue to try and solve the problem as soon as possible.
Petya's decryption key is now available but tough luck for those affected by NotPetya. (Source: MalwareBytes Blog)

Master decryption key for Petya ransomware found to be ineffective against NotPetya

The decryption key for the Petya ransomware seems to be ineffective for use in systems infected by NotPetya, leaving those infected by the nefarious program still in the lurch.
Windows 10 has you covered if you happen to forget your Microsoft Account login. (Source: MSPoweruser)

You will soon be able to recover your Microsoft Account directly from the login screen

Microsoft is testing a new feature in the upcoming Windows 10 Fall Creators Update that enables users to directly recover their Microsoft Account from the login screen itself, thereby saving the hassle of hunting for another device for account recovery.
BlackBerry KEYone

83% BlackBerry KEYone Smartphone Review

Press me! TLC has presented a new BlackBerry smartphone with a physical keyboard: the KEYone. The new smartphone combines a 4.5-inch touchscreen with a touch-sensitive keyboard that can also be used as a Trackpad.
Qualcomm Snapdragon 625 | Qualcomm Adreno 506 | 4.5" | 180 g
The new Samba client for Andriod doesn't use updated SMB protocols. (Source: Android Police)

Google's new Samba client for Android uses the highly vulnerable SMBv1 protocol

The SMBv1 protocol was the entry route for the recent ransomware attacks, and it comes as a surprise that Google is still developing an app based on this protocol — even after it has been deprecated, putting end users at risk.
The Orwl is quite small but includes a plethora of security features. (Source: Crowd Supply)

"Self-destructing" PC will keep hackers at bay

The Orwl mini PC includes a plethora of security features including the protection against physical tempering, which triggers a "self-destruct" mechanism even if the device is unplugged.
Identity verification is now just a video call away. (Source: MSPoweruser)

Skype Lite for Android updated with user verification integration for Indian users

Integration of a citizen's 'Aadhaar' identification into Skype is now possible, providing Indian users with identity verification facility for important calls.
A gold chip containing the  scannable graphene-based ID. (Source: Lancaster University)

New counterfeit detection system uses quantum physics and smartphone software

Scientists from Lancaster University have developed an anti-counterfeit system that uses atomic-scale 2D graphene and quantum properties to tag any kind of object as genuine through a smartphone app.
Ticketmasters wants to replace paper tickets, NFC and QR codes with audio Smart Tones. (Source: Ticketmaster)

Ultrasounds coming from smartphones could replace paper tickets in the near future

With data-over-audio technology from Ticketmaster, customers can skip the ticket checking process and event organizers can reduce fraud.
Image source: Android

Android July update now available for Nexus and Pixel smartphones

July's Android security patch is here for Nexus and Pixel devices and fixes a few vulnerabilities that (thankfully) haven't been widely exploited yet.
Petya’s kill-chain diagram with platform defenses able to mitigate or prevent certain techniques in Windows 10. (Source: Microsoft)

Microsoft ensures Windows 10 is the only way to stay protected against ransomware attacks like Petya

Microsoft's latest threat analysis notes an ever-increasing sophistication in the ransomware codes, but states that Windows 10 and Windows 10 S block such threats by default.
Will the Touch ID fingerprint scanner disappear from the next iPhone? A recent report claims that Apple has a new authentication technology in the works. (Source: Apple)

Rumor: Apple to scrap Touch ID with the iPhone 8

Seeing its debut on the iPhone 5S, Apple's Touch ID has become a staple feature across the company's lineup of devices. However, a recent report suggests that the company is looking to introduce a new form of authentication with the next iPhone.
Razer investigating potential Synapse software security threat

Razer investigating potential Synapse software security threat

We recommend that owners of any Razer laptop or keyboard change their passwords until the manufacturer can provide a proper public response to the apparent security flaw.
Windows 10 users will be prompted to update to the latest version of the OS. Additionally, users are encouraged to review their privacy settings. (Source: Microsoft)

Users still running the first version of Windows 10 are encouraged to update

Microsoft announced in May that, having reached its end-of-life, the initial release of Windows 10 (version 1507) would no longer receive monthly quality updates. Users still running the outdated version of the OS will now be prompted to update via a desktop notification, according to a recent post to the company's blog.
Negotiations with Microsoft by the Indian Government may offer users a low cost upgrade option to Windows 10. (Source: Microsoft)

Microsoft pressured to offer Windows 10 upgrades at 75 percent off due to ransomware attacks

With many devices still languishing with older Windows versions, the Indian Government is pressing Microsoft for a one-time discount on Windows 10 to curb the proliferation of ransomware.
With its vast user base, a recently discovered security flaw in Skype could potentially put millions of users at risk. (Source: Microsoft)

Security exploit discovered in Skype

A recently discovered security flaw in Skype potentially allows remote attackers to execute malicious code. Microsoft has since fixed the vulnerability in a patch, and Skype users are urged to make sure their Skype application is up-to-date.
Toshiba Portégé X30 (i7-7600U, 256 GB) Laptop Review

88% Toshiba Portégé X30 (i7-7600U, 256 GB) Laptop Review

Featherweight champion? Toshiba's Portégé X30 packs tons of features in one of the lightest bodies currently available. Can the X30 compete with other thin-and-light heavyweights, or will it get knocked out?
Intel Core i7-7600U | Intel HD Graphics 620 | 13.3" | 1 kg
Windows Defender Exploit Guard in action. (Source: GHacks)

Microsoft reveals some of the upcoming enterprise security features in the Windows 10 Fall Creators Update

There's never been a time to be more secure than now, and the upcoming Windows 10 Fall Creators Update looks to reinforce this fact
Meet NotPetya, the raging ransomware that could've been prevented by the NSA

Meet NotPetya, the raging ransomware that could've been prevented by the NSA

New ransomware sashay around the block, and it's a situation that may have been prevented by the NSA. Petya and NonPetya are on the loose, with over 2000 organizations around the world facing attacks, according to Kaspersky.
The Asus Mining RX 470 is a card designed for the mining of cryptocurrencies. (Source: Asus)

Asus reveals mining cards for crypto enthusiasts

Asus announces the Mining RX 470 and P106 graphics cards, specifically designed for cryptocurrency mining, The cards should increse mining efficiency by up to 36%.
The submitted patent for the disablement system. (Source: MSPowerUser)

Microsoft patents always-on anti-theft technology for laptops

Microsoft has patented an anti-theft system for upcoming PCs with cellular connectivity, allowing them to be remotely disabled even without a network connection.
UK Parliament was forced to restrict access to their email accounts due to sustained cyber-attacks today. (Source: Justin Tallis/AFP/Getty Images)

UK parliament suffering from sustained cyber-attacks

Parliament's email system has been forced to close itself off from outside connections following a series of persistent cyber-attacks discovered today.
Google's latest announcement will bring a feature users of G Suite have come to expect to Gmail for everyone. (Source: Gmail)

Google says it will stop Gmail's scanning of email to target ads

In a recent post to the company blog, Google announced its plans to "more closely align" the free version of Gmail and the enterprise version found in subscription-based G Suite. This includes removing ad personalization based on the contents of your emails.
The iMac Pro was introduced at WWDC in early June but will not be available until December. (Source: Associated Press)

iMac Pro may pack both server-grade Xeon and ARM CPUs

An enthusiast rummaging through firmware files for macOS High Sierra found information suggesting that the upcoming iMac Pro will be powered by server-grade Xeon processors and protected by an ARM chip known as a Security Enclave Processor. The existence of an ARM chip the same as those found in the MacBook Pro with TouchBar sparks speculation that the iMac ...
Source: Debian

Debian 9 "Stretch" now available

The update brings enhanced security features, more accessible debug tools, and updates to over 51,000 software packages throughout the Debian repositories.
Google looks to take a harder stance against policy violators and online terrorists. (Source: Google)

Google takes a hard line on online terror in its new 4-step plan

In a recent blog post, General Counsel at Google Ken Walker delineated the company's mission to combat terrorism online. While Google already devotes a portion of its enormous resources toward counter-terrorism, the company aims to bolster its efforts with a newly published 4-step plan.
WannaCry is estimated to have extracted US$126,000 in Bitcoin from victims. (Source: Gillian Hann/Twitter)

British intelligence claims North Korea is behind WannaCry, though doubts persist

US and British intelligence services believe that they tracked the WannaCry ransomware to North Korea via attributing it to the Lazarus Group, who hacked Sony Pictures in 2014 preceding the release of the comedy film "The Interview".
The Vivo's optical fingerprint reader was shown in a leaked video. (Source: WeiBo)

New phone from Vivo may feature a fingerprint reader embedded under the screen

A new phone from Vivo appearing in a leaked video was shown to be unlocked by fingerprint through a sensor embedded within the screen on the device. Rumors suggest that this type of sensor might be appearing in new smartphones soon.
Fujitsu Lifebook T937 (i7, 512 GB) Convertible Review

85% Fujitsu Lifebook T937 (i7, 512 GB) Convertible Review

Turned on its head. A business notebook with an all-around worry-free package - already noticeable from opening the box. But the abundant accessories cannot hide the weaknesses.
Intel Core i7-7600U | Intel HD Graphics 620 | 13.3" | 1.4 kg
Google Drive becomes Google Backup and Sync and will release on June 28th. (Source: Google)

Google Drive will become Google Backup and Sync, will be able to back up more files

Google Drive will soon become Google Backup and Sync, which will start backing up your selected files not just from your Google Drive folder, but from almost anywhere on your computer.
Lenovo ThinkPad T470p (Core i7, GeForce 940MX) Laptop Review

88% Lenovo ThinkPad T470p (Core i7, GeForce 940MX) Laptop Review

Ample performance! Lenovo plants a very strong CPU combined with a dedicated GPU into a 14-inch business laptop. This combination, which Lenovo already presented last year, is slightly unusual. You can find out in our detailed review whether the weaknesses of the predecessor were reduced or completely removed.
Intel Core i7-7700HQ | NVIDIA GeForce 940MX | 14" | 1.9 kg
HP Elite x3 Phablet (incl. Lap Dock) Review

86% HP Elite x3 Phablet (incl. Lap Dock) Review

Business racer. HP is the only manufacturer offering a premium device with Windows 10 Mobile, which is mainly targeted towards business customers. Besides a large display, the customer also receives a strong battery, and a robust case, which can even run x86 programs with HP Workspace.
Qualcomm Snapdragon 820 MSM8996 | Qualcomm Adreno 530 | 5.96" | 195 g
Apple is on-track to open 40 Apple retail stores in China by this October. (Source: TechCrunch)

Chinese officials uncover massive data theft by local Apple employees

An underground identity-theft ring where Apple employees were selling customers' personal data was uncovered in China.
The Malware, developed by a Chinese digital marketing company, hijacks the victim's browser and can then steal their private information or install additional malware. (Source: Check Point Threat Intelligence)

Chinese "Fireball" malware infects almost 250 million computers

Chinese company Rafotech has been found to be responsible for the current epidemic of the "Fireball" malware, which has affected nearly 250 million computers worldwide. Fireball is usually installed by piggybacking on an installer of wanted software; it then hijacks the user's browser and can then proceed to do anything from spying to dropping additional mal...
Intel and Microsoft moving forward with always-on eSIM PCs

Intel and Microsoft moving forward with always-on eSIM PCs

Notebook PCs will soon have WWAN/LTE capabilities without requiring external SIM cards or special modems.
The Compute Card is meant for a different audience than the consumer-oriented Compute Stick. (Source: Intel)

COMPUTEX 2017 | Intel's credit card-sized PC fully detailed

Intel has revealed more details on the Compute Card this Computex. The Card will be available in four SKUs and will begin shipping in August. Pricing is not confirmed.
A recently confirmed Android exploit can seize control of your device. (Image source:

"Cloak and Dagger" vulnerability can leave your Android phone open to attack

The exploit, which has long been theorized, was confirmed by computer security researchers. By using invisible overlays and some clever social engineering, hackers can quickly gain full control to an Android device.
The unassuming intrusion method has made this attack one of the most widespread in recent history. (Source: Check Point)

Vulnerability found in subtitle system of VLC, Kodi, and other media players

By injection malicious code into subtitle files, hackers are able to take full control of a device that loads the malicious subtitles. The exploit affects four of the biggest media streaming services: VLC, Kodi, Popcorn Time, and
Say goodbye to Messenger "Days", games, and poor performance by using Messenger Lite. (Source: Facebook)

If you're tired of Facebook Messenger's bloat, try Messenger Lite

Facebook's ubiquitous chatting app, Messenger, has become so bloated that Facebook has already spun off a version for developing markets called "Messenger Lite". To install it in most countries, however, you'll have to sideload it on your Android phone.
One metric for assessing the validity of a threat is its specificity. (Source: The Guardian)

Leaked internal Facebook censorship guidelines fuels concern about ethics

Internal documents from Facebook revealed to the Guardian show the difficulties the company is facing to police its 2-billion-strong membership.
Amazon Echo Dot Review

Amazon Echo Dot Review

Big ears. With the Amazon Dot, we are looking at the smaller of the two speakers from the US-based retail giant. While the assistant Alexa was very convincing in the test, the power consumption and data security provided reasons for criticism.
unknown | unknown | | 163 g
The Surface Laptop keeps the Surface aesthetic, but ditches the traditional Windows 10 OS. (Source: Twitter User @h0x0d)

Microsoft's new "Surface Laptop" reveals how seriously the company takes Chromebooks as a threat

Images and information leak about the Microsoft's latest piece of hardware, the Surface Laptop. The Laptop is designed to combat the rising popularity of Chromebooks in education and business by running a lighter, more secure cloud-based OS called Windows 10 S.
The Meizu PRO 5 was the last officially supported Ubuntu Touch phone. (Image Source: Ubuntu Insights)

Ubuntu Phone support will end in June, app store will close in December

The mobile OS will no longer be updated after June of this year, while the Ubuntu Touch app store will be closed by the end of the year. These moves will essentially kill off Ubuntu Touch.
In 2015, it was cited as the means by which cyber-attackers stole more than £20m from British bank accounts. (Source: BBC)

Researchers: Microsoft Office security hole exploited by hackers and government agencies

Microsoft recently released a security patch to resolve a vulnerability in Microsoft Office. Attackers, including malware distributors and cyber-espionage groups, are exploiting the flaw to seize control of users' systems.
The personal data of 100,000 taxpayers has been compromised through an exploit of the FAFSA program. (Source: IRS)

Hackers compromise U.S. taxpayer data through university financial aid system

Using an exploit in the Free Application for Federal Student Aid and tools used to retrieve tax data, hackers were able to breach part of the IRS database and steal personal data for 100,000 U.S. taxpayers.
Holding a picture of the owner's face in front of the camera seems to be enough. (Source: iDeviceHelp)

Samsung Galaxy S8 can be unlocked with a photograph

A video has surfaced of Samsung's new Galaxy S8 being tricked into unlocking with a photograph, raising questions of security.

Working For Notebookcheck

Are you a loyal reader of notebookcheck? Are you a techie who knows how to write? Then join our Team!

Especially wanted: 
Review Editor - 
Details here
News Editor - Details here






Please share our article, every link counts!
> Notebook / Laptop Reviews and News > News > Topics
Redaktion, 2013-05- 8 (Update: 2013-09-27)