Shared Links (weekly) Feb. 2, 2025
For more like this, subscribe to the newsletter and get these links and more in your email.
M365 Links:
Be sure to subscribe to my M365 Newsletter for more M365 expertise and news.
Follow these topics: Weekly Links
For more like this, subscribe to the newsletter and get these links and more in your email.
M365 Links:
Be sure to subscribe to my M365 Newsletter for more M365 expertise and news.
Follow these topics: Weekly Links
Of course, when we create new laws or tools, we focus on the problem in front of us. Whether that be, in this case, trying to enforce an age restriction or requiring identity verification in some odd attempt at making it more difficult for people to engage in anonymous speech, we too often forget the details of how that would work exactly.
If you’ve paid much attention to the eDiscovery space over the last months, you may have noticed the same trend that I have. It seems that every other article that I have seen on the topic is mentioning either Cybersecurity, or Information Governance, along with eDiscovery. This is not a coincidence. Data breaches have become…
In other words, VW created a backdoor, and assumed that it would remain hidden. But it did not. Backdoors are bad, and anyone who thinks they should be required to allow law enforcement access should be forced to take personal responsibility when something like this happens. https://www.techdirt.com/articles/20160812/10515435227/volkswagen-created-backdoor-to-basically-all-cars-now-hackers-can-open-all-them.shtml Follow these topics: Links, Tech
Older ICQ software vulnerable to attack Gee and it’s not even a Microsoft product..*L* Seriously though, if you’re still using an older version, grab the new one. Or think about getting Trillian , which is what I’m using. While you’re being careful, you want to be on the lookout for the Gigger virus. Haven’t seen…
As Dana pointed out, this is an interesting article about Microsoft adding a built-in virus scanner to Windows XP SP2. I’m torn, obviously. On one hand, for all those home users who never seem to be able to use AV properly, maybe this isn’t such a bad thing. Although many still won’t remember to update…
Check the lists and if you have accounts setup to use any of the common usernames or passwords, you might want to go ahead and change that. Like now, before someone starts remotely controlling your computer. Assuming they haven’t already. The Top 10 Usernames and Passwords Hackers Try to Get into Remote Computers Follow these…