Home Page

About Us | Become a Member | Calendar | What's New In CCS | Members Only | Tips | Facebook | Site Map


Home Page | News-TipsI | Links

Previous News & Tips Weekly Page 08/08/2021 - 08/14/2021 Next

Weekly News & Tips Index

NOTICE:If you go to a page via a link and it can't find it, try copying the article heading and doing a search on the article web site.  Sometimes they move articles after I post them which changes the link address.

  Day of week Date News & Tips Number    
Sat 08/14/2021 N/A
Fri 08/13/2021 N/A
Thur 08/12/202 N/A
Wed 08/11/2021 N/A
Tue 08/10/2021 2302
Mon 08/09/2021 2301
Sun 08/08/2021 2300

Sat 2306 08/14/2021


Back to Top

Fri 2305 08/13/2021


Back to Top

Thur 2304 08/12/2021


Back to Top

Wed 2303 38/11/2021


Back to Top

Tue 2302 08/10/2021

British man arrested in connection with Twitter mega-hack that posted cryptocurrency scam from celebrity accounts



We Studied One Million Students. This Is What We Learned About Masking.



Don't post that! 5 surprising things you should never share on social media



How to Make a USB Drive That Can Be Read on Macs and PCs



Can I remove malware myself or do I need to pay someone?



How to Use a Fake IP Address and Mask Yourself Online

Sometimes you need to hide your IP address. Here are some ways to mask your IP address and make yourself anonymous online.



Back-to-school shopping: Security and privacy software



How to quickly view your files and documents in Windows with QuickLook

The free QuickLook tool can display a variety of file types without you having to open them or launch their applications.



The social network for doctors is full of vaccine disinformation

  - Doctors on the industry networking site Doximity are finding their news feed inundated with anti-vaccine comments from fellow physicians.

  - “You rarely get to the level of microchips in vaccines, but a lot of this stuff is pretty close to it,” said Dr. Paul Malarik, a retired psychiatrist who now volunteers with Covid-19 vaccine administration.

  - Doximity held its IPO in June and is now valued at over $10 billion.



iPad mini 6 could arrive without a premium Mini LED display upgrade

There are conflicting rumors on this one



New bank-fraud malware called Vultur infects thousands of devices

Screen sharing courtesy of VNC mirrors device screens to attacker-controlled servers.



Windows 11: The Beginning of a New PC Age



IT Heads Wary Big Tech Will Taint Trust in Open Source: Report



How to remove Search, Task view, Widgets, Chat from taskbar on Windows 11

You can choose which buttons appear on the Windows 11 taskbar, and here's how.




Efficiently and accurately analyze your computer's network traffic and get customized reports as well as nice visual representations with the help of this app



[Tip] Disable Surveys, Rate Your Experience, Out of Date Notifications in Firefox



Why Your Data is Not Really Ever Safe

Scrapers gonna scrape



Windows 11 update improves taskbar, Microsoft Store and more



Kuo: Mid-2022 MacBook Air to come in multiple colors with similar form factor as upcoming MacBook Pro



The social network for doctors is full of vaccine misinformation

Doximity, which has long described itself as LinkedIn for doctors, highlights how medical professionals are not immune to misleading claims.



10 best ways to block blue light to protect your eyes



Citizen Protect Offers Up App-Based Security Help for $20 Per Month (???)

Citizen Protect offers 24/7 access to professional safety experts who can guide people out of trouble or call 911 for them. Those 'Protect Agents' are made up of former 911 operators and emergency medical technicians.



4 signs your phone has hidden malicious apps



What Is “root” on Linux?



Why didn't my anti-malware tool catch malware that was delivered when I visited an adult site?



7 Tools to Increase Hard Drive Performance on Windows

Windows slows down over time, but you can improve the speed and efficiency of your hard drive with these HDD optimization apps.



Avast Red Team’s top 5 security tips for your grandma



Dropbox adds suggested folders, file conversion, camera uploads and more

The goal is to help home and business users stay better organized and access their important Dropbox files more easily.



White House backs senators pushing for stricter crypto reporting rules

  - There is a crypto amendment battle underway between two camps of senators.

  - The fight is over a provision in the bipartisan bill, which raises money through stricter tax rules on cryptocurrency transactions.

  - The White House wrote in a statement late Thursday that the “amendment put forward by Senators Warner, Portman, and Sinema strikes the right balance and makes an important step forward in promoting tax compliance.”



Nvidia RTX 4000 ‘Lovelace’ GPUs design finalized, could arrive end 2022

Set to be built on TMSC 5nm, or maybe even 5nm enhanced



Forget “App Tracking Transparency”: Facebook is enjoying more ad revenue than ever

Facebook's CFO predicts the worst is yet to come, though.



SEC Reportedly Probing SolarWinds Breach



Researchers Track Linux Intrusions to Cryptojacking Gang



How to free up space with cleanup recommendations on Windows 11

Windows 11 can now tell you the files and apps to delete to help free up hard drive space on your PC – here's how to use the feature.



Hasleo Disk Clone

Copy your disks and partitions securely to a new location and clone the local Windows system thanks to this user-friendly application



Apple’s exciting new MacBook Air redesign won’t launch until next year



[Fix] “This App can’t Run on this Device” Message from Program Compatibility Assistant in Windows



How Google's New Search Warnings Could Fight Misinformation

The new approach to breaking news could boost media literacy



Akamai DNS global outage takes down major websites, online services



Report: iPhone 13 Pro models to add Portrait video mode, ProRes recording, other camera improvements



Step 1: Do a Google search. Ransomware hacker goes rogue, leaks gang's plan.

Ransomware hackers have sparked international action, but they are often informal enterprises that can turn on one another.



How to store your COVID vaccine card on your iPhone or Android



Amazon Is Offering $10 for Your Palm Print

Money in return for biometric data linked to your Amazon account. Tempted?



Is your tech safe while you work from home? How to protect your computer from hackers



Should You Use a VPN for All Your Web Browsing?



Why has the spam I'm seeing increased?



Are Browser Extensions Really Safe?

While they provide a customized functionality to our browsing experience, are browser extensions safe to use?



How to identify the language tech support scammers use to scam



How to integrate and use Microsoft Office with Dropbox

Learn how to create, store and share Microsoft Office documents using Dropbox.



What is response time? Input lag and monitor speed explained

Response times are important – here's what you need to know



Google Play gets mandatory app privacy labels in April 2022

After delaying its iOS privacy labels for months, Google copies the feature for Play.



Reports of TurboTax Breach Greatly Exaggerated



MakuluLinux Core Now Built on Forked Gnome



Windows 10 now blocks Potentially Unwanted Apps (PUA) by default

Windows 10 now enables potentially unwanted app blocking by default to add another layer of security.



DuckDuckGo Privacy Essentials for Firefox

Search the internet using this safety- and privacy-first extension, and avoid trackers or other online threats without actually having to do something



This free iPhone app is so incredible, it’s hard to believe it’s real



[Software Update] Microsoft PowerToys 0.43.0 Now Available for Windows 10



How to Deal With the Crackonosh Malware, According to Experts

TL;DR: don’t download cracked PC games



Ransomware gang breached CNA’s network via fake browser update



Roundup: Here’s what’s new in iOS 15 beta 5



Privacy and efficacy concerns remain for New York's vaccine passport apps

“People are going with something that is completely unproven and potentially harmful,” said one privacy expert.



Hackers have a new target: Your Kindle – Here’s how they can take over



AMD vs. Intel: Will the Battle for Chip Supremacy Push the Rivals Together?

For years, neither company has been able to claim absolute victory. But as Amazon, Apple, Google, and other tech giants design and manufacture their own processors, will AMD and Intel circle their wagons?



What is malware — and how can you protect yourself from it?



Chromebooks in 2021: Can One Be Your Full-Time Computer?



Do I need to make a new recovery disc each time I backup my system?



10 Ways to Boost Productivity by Decluttering Your Workstation

Find out how a clutter-free workstation helps you to work attentively and complete the tasks on time.



Here's how Apple's "Hide My Email" feature works



How to quickly insert contact information into a Word document

When you need to insert contact information that's in Outlook's Address Book into a Word document, add the Address Book to Microsoft Word!



Ethereum mining will soon be obsolete, as ‘London’ update moves key deadline to December

  - EIP-3554 moves up the detonation date of the difficulty bomb by six months to December, and once it goes off, it will ultimately make ethereum “unmineable.”

  - Since December 2020, the ethereum community has been testing out the proof-of-stake workflow on a chain called Beacon. 

  - While you don’t need a bomb to go off to roll out proof-of-stake mining, it helps move things along by closing the on-ramp to proof-of-work mining. 



Microsoft Teams is finally solving this Office files headache

Teams users will soon be able to open Office files in a browser or standalone apps



Feds list the top 30 most exploited vulnerabilities. Many are years old

Hackers continue to exploit publicly known—and often dated—software vulnerabilities.



Microsoft Sets 2025 End Date for Windows 10 Support



Stale Open Source Code Rampant in Commercial Software: Report



How to block potentially malicious apps on Windows 10

Windows 10 May 2020 Update ships with a new feature to protect against potentially unwanted apps, and here's how to enable the feature.



SingleFile for Firefox

Use this neat extension if you want to save a browser page in one single HTML file, with all the resources, including pictures, in it



It’s not just you: Thousands of major websites just went offline



[Tip] Enable Tab Search, Sharing Hub and Full Dark Mode in InPrivate Mode in Microsoft Edge



Why You Should Have the Right to Repair Your Own Devices

Break out the screwdrivers



CISA warns of stealthy malware found on hacked Pulse Secure devices



Apple Privacy exec details system to detect CSAM in new interview



Amazon to cut waste following backlash over the destruction of unused products

The move comes less than two months after British broadcaster ITV reported that Amazon was destroying millions of items of unsold stock at one of its 24 U.K. warehouses every year



Gmail is scanning your emails as you write them – unless you change this setting



Google Makes Chrome for Android a 2FA Option

An update to Chrome for Android makes the mobile browser another security key option for Google users with accounts that rely on two-factor authentication.



Google just released a new feature to fight annoying Google Drive spam



BlackMatter rises from the ashes of notorious cybercrime gangs to pose new ransomware threat



Getting Old Is a Crisis More and More Americans Can’t Afford



Run a Linux virtual machine in Podman

Use Podman Machine to create a basic Fedora CoreOS VM to use with containers and containerized workloads.



Head Of Cybersecurity Firm That Detected USAID Hack Explains What Happened



The Bash Trap Command



“Chkdsk Cannot Run Because the Volume Is in Use by Another Process”


Back to Top

Mon 2301 08/09/2021

Windows 365 costs how much!? ( this is for business and those working from home for business that the business pays for)

Yes, Microsoft’s Windows 365 Cloud PC costs more than people expected, but take a closer look and you'll see it makes sense — in some cases 



Microsoft Explains Windows 11 Changes



Gigabyte is the latest major PC maker to suffer a ransomware attack



How to Check Version History in Google Sheets



All future Windows Server releases receive 10 years of support



5 Linux Smartphone Operating Systems to Install on Your Device

Want to replace Android on your phone? Try out these Linux mobile operating systems for smartphones and tablets.



The 40-year Takeaway

Looking forward by looking back.



Ransomware: International cooperation is needed to curb these cybersecurity threats, says expert

Ransomware knows no borders. An attorney with cybersecurity expertise suggests the only way to stop ransomware is for nations to create a global solution.



The Avast Red Team's top 5 security tips for SMBs



Google Drive now let you ban spammers

You can now block individual users in Google Drive



Tech’s pandemic boom is coming to an end

  - Tech companies from Apple to Roku warned investors not to expect the same hyper growth in their businesses that they saw in 2020.

  - As the world opens up, people are relying less on technology to shop, work and play.

  - Still, the biggest tech companies expect to show impressive growth but have largely lapped the boom from 2020.



Biden says he has deal to lower Internet prices, but the details will matter

Biden strikes $65B broadband deal but didn't release details on speeds and prices.



Serious flaws in widespread embedded TCP/IP stack endanger industrial control devices

Critical vulnerabilities potentially affect millions of devices, but finding and patching them will be difficult.



Clean install Windows 11 – supported methods

Here are the six supported methods to clean install Windows 11 on a computer.



Why the M1 MacBook Air Convinced Me to Ditch the iPad

It’s all about power




Discover an open-source suite of tools for robotic process automation, with dedicated browser extensions, that aims at performing recurring business processes by itself



Windows 11 Kills The Blue Screen Of Death



[Security Alert] Immediately Protect “Config” Directory in Windows 10 and Windows 11



Sprint's Legacy LTE Network Is Scheduled to Go Offline in June 2022

The continued shutdown of Sprint's legacy cell coverage comes as T-Mobile looks to expand its newer 4G and 5G networks.



Chinese state hackers breached over a dozen US pipeline operators



Chinese state media slams video games, warns of addiction among children

An article by a Chinese state-run publication calling for new restrictions sent share prices in tech giants Tencent and NetEase sharply lower.



Windows 10: New feature stops potentially dangerous apps from running – Check if it’s enabled



Apple Pulls Dating App for Unvaccinated People Over COVID-19 Misinformation

The dating app had recently added a social feed, where users could publish posts, including conspiracy theories about the COVID-19 vaccines.



Forgot your password — again? Try this



How to Sign Up for a VPN Anonymously



Microsoft crippled the Windows 11 Taskbar



Project xCloud Is Coming to Your TV... Without the Console

Microsoft just announced a partnership with internet-connected TVs, so you can play Xbox games with just a controller.



“Chkdsk Cannot Run Because the Volume Is in Use by Another Process”

What it means and how to fix it.



Ransomware fallout is devastating and could often be avoided, study finds

Ransomware victims face tightened budgets, lost productivity and other problems. In most cases, new post-attack security measures could have prevented the ransomware attack if implemented beforehand.



Is storing a digital driver’s license on your phone a good idea?



Global chip shortage could stretch into 2023, Intel CEO warns

It might take up to two more years to fully catch up to demand, says Intel chief



Apple will report images of child sexual abuse detected on iCloud to law enforcement

  - Apple will report child exploitation images uploaded to iCloud in the U.S. to law enforcement, the company said on Thursday.

  - The new system will detect images called Child Sexual Abuse Material (CSAM) using a process called hashing, where images are transformed into unique numbers that correspond to that image.

  - Apple says that its system is more private for users than previous approaches to eliminating illegal images of child pornography, because it uses sophisticated cryptography on both Apple’s servers and user devices.



Apple, AMD, and Intel shift priorities as chip shortages continue

Apple, AMD, and Intel each acknowledge their preparation for ongoing shortages.



5 riskiest mobile apps

Unsanctioned applications on corporate mobile devices is a security headache. Here are the five types of apps CISOs never want to find on corporate mobile devices, with strategies for mitigating the risks they pose.



How to control background apps on Windows 11

You can still prevent apps from running in the background, and on Windows 11, these are the steps to change the permission settings.



PrintNightmare Fix Doesn't Agree With Some Printers

Microsoft's patch addresses the issue, but it's also causing connection errors




Dual boot with ease between Linux and Windows operating systems as well as the Mac OS X with extended support for Linux distributions



Russian Ransomware Group Suffers Big Blow



[Tip] Enable New “Desktop Sharing Hub” Feature in Google Chrome



Citizen Launches a $20 Service You Can Call to Call the Cops

The company's new feature, Protect, is supposed to serve as an alternative to just dialing 911.



NPM package steals Chrome passwords on Windows via recovery tool



A D for NASA, a C for HUD: Senate report warns agencies unprepared for cyberattacks

Government agencies and major companies, such as Microsoft, have reported intrusions by foreign hackers in Russia and China.



People are paying $299 to get back into their hacked Facebook accounts – Here’s why



The Best Cheap Phone Plans for 2021

There are a lot of options beyond the big three phone carriers in the US. If you're looking to save money, these lesser-known low-cost cell phone plans might be the ticket.



Second Opinion: How the U.S. can deter ransomware attacks



PSA: Your Internet Provider Has More Plans Than It’s Showing You



Workaround for Windows 10 and 11 HiveNightmare Windows Elevation of Privilege Vulnerability



The 7 Best Free Calling Apps (Unlimited Calls With Wi-Fi)

Need to make cheap calls while on Wi-Fi? Check out these phone apps that offer free calling and texting.



Should I Use RAID for Backup?

You could be making things worse.



Companies are losing the war against phishing as attacks increase in number and sophistication

A new report finds that 74% of companies have been the victim of phishing in the last year. Staff shortages, a lack of security training and an increase in mobile device usage for work are factors.



Who can see your address online?

What was once only available to those in our local communities is now available to anyone, anywhere in the world



The best medical alert systems and services for every budget 2021

Discover the best medical alert system for you or your loved one today



Amazon, Google and other tech companies join government effort to fight ransomware

  - Amazon, Google and Microsoft are among several tech companies that have agreed to join a government effort to fight ransomware.

  - Cyber attacks have become a more regular threat to U.S. organizations.

  - The new initiative aims to increase info-sharing and planning between the public and private sector.



Here’s what that Google Drive “security update” message means

Google is making its sharing links harder to guess, and it's notifying users.



GAO report faults CIOs, OMB for slow adoption of cybersecurity recommendations

The US agency highlight four areas where cybersecurity gaps in federal agencies threaten national security. Cites OMB for not helping CIOs get available funds.



How to enable classic File Explorer ribbon menu on Windows 11

Yes, you can bring back the classic ribbon menu to File Explorer, and here's how on Windows 11.



Why Windows 11 Makes Me Want to Switch from Mac

It’s more Apple than Apple



System Information HTML Application

View your hardware configuration, .NET Framework versions and installed software, write notes, as well as save and print information



Report: FCC Broadband Definition Too Slow



Windows 10 21H2 Feature Update Changelog



Google Is Finally Killing Off a Decade-Old Version of Android

Android Gingerbread is heading for the graveyard, but not without a proper send-off first.



Google Chrome now comes with up to 50x faster phishing detection



What is a 'metaverse,' and why is Mark Zuckerberg so excited about it?

There were 20 mentions of the term on Facebook's recent hour-long call earnings call, indicating just how much the idea has emerged in recent months. 



What car dealers won't tell you about electric cars



Zoom to Pay $85M Settlement for Violating User Privacy, Allowing Zoom-Bombing

Users may get a payout of $25 whereas lawyers are seeking $21.25M in legal fees.



Is someone using your webcam to spy on you? How to know and what to do to protect your privacy



How to Add a Drop-Down List to a Word Document



Windows 11's Android future is secured: Amazon Appstore will support App Bundles



What You Need to Know About Android Auto

Is your car connected? If not, could it be? This week we take a look at Android Auto and learn how to get the most out of it.



Did Microsoft Lie?

The dangers in believing sound bites and clickbait.



How to activate virtualization-based security and core isolation in Windows 10

Give your PC a little extra security. HVCI and VBS are available in 64-bit versions of Windows 10, but you must turn them on manually. We show you how.



Is voice cloning a security threat?



Seagate set to launch mass-market 20TB HDDs

Seagate offers multiple technologies in its 20TB drive portfolio



Amazon plans to cut waste following backlash over the destruction of unused products

  - The so-called Fulfilment by Amazon programs, announced in a blog post on Wednesday, will help to build a circular economy, the company said.

  - They come less than two months after British broadcaster ITV reported that Amazon is destroying millions of items of unsold stock at one of its 24 U.K. warehouses every year, including smart TVs, laptops, drones and hairdryers.

  - One of the programs will allow third-party businesses on Amazon to resell returned items as “used” products, Amazon said. The other will allow sellers to use Amazon’s “wholesale resale channel and technology” to recover a portion of their inventory cost from returned items and excess stock.



Biden warns cyber attacks could lead to a “real shooting war”

US president's remarks follow breaches that paralyzed critical services.



NSA, CISA release Kubernetes hardening guidance following Colonial Pipeline, other attacks

The guidance seeks to educate IT administrators about cloud security risks and best practices for implementing and maintaining Kubernetes.



How to enable dark mode on Windows 11

Windows 11 includes a dark mode to personalize the desktop experience, and here's how to enable it.



HP Reveals the Pavilion Aero, Its Lightest Laptop Yet

The 13-inch laptop weighs less than 1 kilogram and will be available this July



DDoS Attacks Are Back, More Aggressive Than Ever

The findings of recent research into the security risks associated with Internet traffic were published by Telia Carrier recently. The statistics are extremely alarming, as they reveal that DDoS attacks surged by 50%, according to Help Net Security.  



Web 'Influencers' Must Label Photoshopped Pics



How to Enable TPM 2.0 and Secure Boot to Install Windows 11?



Billions of Dollars Later, the U.S. Government Remains as Hackable as Ever

The U.S. has poured billions into protecting federal agencies with little to show.



XLoader malware steals logins from macOS and Windows systems



White House touts broadband part of new infrastructure deal

"It will deliver high speed internet to every American," President Joe Biden said Wednesday.



10 common Netflix errors and how to fix them



YouTube Is Testing a Cheaper 'Premium Lite' Subscription

It's about 40% cheaper than YouTube Premium, but only offers ad-free viewing.



What's a phishing scam? Cyber security experts break it down



The 6 Most Fun Learning Apps for Kids

With the right apps, any smartphone can become a powerful learning tool that’s fun and engaging for kids. Here are the best apps to consider.



Homoglyph domains used in BEC scams shut down by Microsoft



Linux package managers: dnf vs apt

Package managers do the same general things—installing, managing, and uninstalling applications—but they don't do everything the same.



Russia's FSB Reports 'Unprecedented' Hacking Campaign Aimed at Government Agencies



Eufy's feature-packed Wi-Fi Video Doorbell is cheaper than ever

Amazon is selling the Anker Eufy Security Wi-Fi Video Doorbell for $80 right now.



Linux vs. Windows: What's the difference in 2021?



Which Email Service Should I Use?


Back to Top

Sun 2300 08/08/2021

Global Ransomware Damage Costs Predicted To Exceed $265 Billion By 2031

Fastest growing type of cybercrime is expected to attack a business, consumer, or device every 2 seconds by 2031



Russia disconnected itself from the rest of the internet, a test of its new defense from cyber warfare, report says



How to Get Roadside Assistance Using Alexa



How to Delete Old Windows Update Files

There is still one part of Windows Update that needs your attention: the old files that are left behind. They can take up a lot of space.



Intel releases first Windows 11 ready Graphics Driver



My machine's suddenly started acting erratically, even after a reinstall. How do I fix it?



Spam Kingpin Peter Levashov Gets Time Served



Why Nvidia’s $40 billion bid for Arm could be in jeopardy

  - The deal, one of the biggest semiconductor takeovers ever, was announced in September to much fanfare, although competition regulators around the world soon announced plans to investigate the acquisition.

  - Probes were launched in the U.S., the U.K., China and Europe after companies like Qualcomm, Microsoft, Google and Huawei complained that the deal was bad for the semiconductor industry.

  - The U.K. is reportedly considering blocking the deal on national security grounds.



Linux 101: What are aliases and how do you use them?

Jack Wallen introduces you to aliases to help make your Linux command life a bit simpler.



Aruba Notified Customers Regarding a Data Breach After Two Months

Following an online complaint from its customers who claimed that the company had taken too long to notify them of the breach, the Italian web hosting company Aruba confirmed that it had experienced a data breach, according to The Daily Swig. 



Haron and BlackMatter are the latest groups to crash the ransomware party

The additions come as the number of high-severity ransomware attacks ratchet up.



Best medical alert with GPS tracking in 2021

Find the best medical alert with GPS tracking for your budget today.



How to share internet connection through Ethernet on Windows 10

Windows 10 ships with the Internet Connection Sharing feature to quickly share the internet through other devices via Ethernet and WiFi, and here's how to set it up.



Why Your Computer Might Not Support Windows 11

Improved security at a high cost



How to Check Your Computer has TPM 2.0 for Windows 11?



Microsoft shares workaround for Windows 10 SeriousSAM vulnerability



MS Paint Is Getting a New Look in Windows 11

The update is mostly visual and adds a new header, simplified toolbar, and rounded corners



New DNS Attack Enables 'Nation-State Level Spying' via Domain Registration



Who us??? Kaseya says it hasn’t paid anybody for its ransomware decryption key



Researchers are testing concrete that could charge your EV while you drive

Magnetized cement promises reasonably priced, high efficiency wireless charging.



How to wipe a hard drive on your Windows PC or Mac



Still on Android 2.3? Upgrade Now or Lose Access to Your Google Account

Any device running Android 2.3.7 or older will be locked out of Google accounts on Sept. 27.



How to delete cookies from your computer — and why it matters



How to Use FaceTime for Windows



10 Incredible macOS Monterey Features We’re Excited About

With macOS Monterey expected to release later this year, here are all the new features we're most excited about.



Microsoft makes it official: Windows 10 version 21H2 announced



Why has my computer been locked by cyber cops?



Don’t Wanna Pay Ransom Gangs? Test Your Backups.



The IRS has seized $1.2 billion worth of cryptocurrency this fiscal year – here’s what happens to it

  - The U.S. government regularly holds auctions for its stockpile of bitcoin, ethereum, litecoin and other cryptocurrencies it seizes and then holds in crypto wallets.

  - It really kicked off with the 2013 takedown of Silk Road, a dark web marketplace trading in illegal goods, where bitcoin was often used for payment.

  - Interviews with current and former federal agents and prosecutors suggest the U.S. has no plans to step back from its side hustle as a crypto broker.



How to quickly run diagnostics on your Chromebook

Is your Chromebook acting up? Jack Wallen introduces you to the ChromeOS Diagnostic tool, with which you can run hardware tests on your Chromebook.



Kaseya Obtains a Universal Decryptor to Support REvil Ransomware Victims

The software vendor Kaseya said on Thursday that it has obtained a universal decryptor for unlocking systems and helping clients to recover data, according to The Hacker News. This happened almost three weeks after the broad-based supply chain ransomware attack on the company. 



Review: Framework’s lightweight modular laptop is a winner

Framework's laptop isn't just repairable—it's a solid laptop in its own right.



Microsoft support scams skyrocketed over the past year - here's what you need to know

And tech-savvy users fall victim more often




If you no longer need a printer, this is how you can get rid of the leftover drivers.



Windows 11 Is Starting to Feel Like macOS

And that isn’t a bad thing



How to Enter BIOS Settings on Your Windows PC?



Microsoft Teams chat feature rolling out to Windows 11



You Can Finally Buy Apple's Magic Keyboard with Touch ID Without Buying an iMac

The keyboard is no longer exclusively bundled with the $1299 iMac, but it still only works with M1 computers.



'Sophisticated Group' Behind Alaska Cyberattack, Agency Says



Average ransomware payments decline… but that’s not good news



China plans to build the first 'clean' commercial nuclear reactor

Thorium-based tech produces safer waste and can't be easily used for nukes.



5 best diagnostic tools for your PC



Tesla Reportedly Agrees to $1.5 Million Settlement for Battery Throttling Case

The proposed settlement would give affected Tesla Model S owners $625 each.



Hackers are tricking kids into installing malicious apps—here's how to keep your family safe



How to Add or Subtract Dates in Microsoft Excel



7 Ways You Can Reduce E-Waste

E-waste has a huge impact on the environment. Instead of throwing old technology away, what can you do to make things better?



You can still upgrade Windows 7 and 8.1 systems to Windows 10 for free



Why did I get infected even though I run anti-malware software?



Spike in “Chain Gang” Destructive Attacks on ATMs



Security concerns over chip shortage are pushing governments to act, Moody’s says

  - More countries are pushing to produce their own semiconductor chips, which are in short supply globally, because “it’s a matter of national security,” according to Timothy Uy from Moody’s Analytics.

  - Memory chips are crucial for making a wide range of products. They are in smartphones, gaming consoles like PlayStation 5s, household appliances like fridges and washing machines, alarm clocks, and even cars.

  - Some reports say the chip shortage may last until 2023.



How to remove duplicate Excel records before running a mail merge with Word

If your source data is in Excel and has duplicates, run Power Query to remove those duplicates before running a Word mail merge.



Dangerous macOS Malware XCSSET Targeting Chrome and Telegram

As part of further tactic enhancements, a malware strain known to target macOS has been updated once again to include features that allow it to gather and exfiltrate sensitive information saved in different applications, including Telegram and Chrome, according to The Hacker News. 



Report: The iPhone 14 will be a major upgrade, and it will be made of titanium

Also, the note corroborates reports that the iPhone mini will die in 2022.



SmartSniff: what is it and how to watch your internet traffic in real-time

This has to be the smallest, simplest traffic capture tool around



How to see all existing user accounts on Windows 10

If you need to see all the existing user accounts configured on your device, in this guide, you'll learn four ways to do it on Windows 10.



Google Wants You to Use Its New Drive for Desktop App

Backup and Sync users have until October to switch



[Security Alert] Immediately Disable Printer Spooler Service in Windows



DuckDuckGo's new email privacy service forwards tracker-free messages



U.S. Infrastructure Bill Allocates $2 Billion to Cybersecurity



No More Ransom website celebrates five years of providing free ransomware recovery tools and advice



How to clean and organize your PC

Make Windows look and run its best.



Digital Life Hack: Your AirPods are a secret spy tool



Amazon Fined $887M By EU Privacy Regulator

The European Union believes the company failed to comply with GDPR rules, but Amazon disagrees.



Chinese Hackers Compromised Telecom Companies, Researchers Say



How to Block YouTube Channels



What We Know About Google's New Whitechapel Chip

Google's new in-house chip Whitechapel is set to power the next flagship Pixel phone. Here's what you can expect.



Another nail in Windows 8's coffin



Why might deleting cookies cause my computer to be unauthorized with online accounts?

Deleting cookies will make online accounts forget who you are and cause you to answer all your security questions again.



Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software



Google will abandon Qualcomm and build its own smartphone processors this year

  - Google announced it will build its own smartphone processor, called Google Tensor, that will power its new Pixel 6 and Pixel 6 Pro phones this fall.

  - It’s another example of a Big Tech company building its own chips instead of relying on a traditional chipmaker like Qualcomm or Intel.



Kaseya attack: How ransomware attacks are like startups and what we need to do about that

The Kaseya attack is especially unique because it didn't begin with a password breach, and the companies were following cybersecurity best practices. So, how can we protect against this threat?



Password-Stealing Windows Malware has been Discovered

A newly discovered malware sent to victims via ads displayed in search results is being used to steal passwords, install cryptocurrency miners, and run other Trojan infections, according to ZDNet. 



An explosive spyware report shows limits of iOS, Android security

Amnesty International sheds alarming light on an NSO Group surveillance tool.



The lessons to be learned from the Colonial Pipeline attack

The lessons to be learned about software security



How to open Microsoft Edge always InPrivate mode on Windows 10

Microsoft Edge lets you set InPrivate mode as the default experience when opening the browser, and here's how to enable the option.



Google Meet Adds 60-Minute Limit for Free Video Calls

No more unlimited call times



Windows 10 Users will Get Free Upgrade to Windows 11, Here is How to Check?



New Windows 10 vulnerability allows anyone to get admin privileges



'The Situation Is Very Serious': Ransomware Hackers Hobble Covid-19 Vaccinations in Italy

The shutdown affects the Lazio region, which includes the city of Rome.



Iran-Linked Hackers Expand Arsenal With New Android Backdoor



No, your Grindr activity is not necessarily private – just ask the senior Catholic priest who was outed and lost his job



Alphabet's latest moonshot aims to make industrial robots more practical

Even a small business could put robots to use.



Digital Life Hack: Debunking a popular myth about smart thermostats



Apple Warns AirTag Owners Not to Use Bitter Batteries

The bitter coating applied to help deter kids from swallowing coin batteries can cause AirTag problems.



Kaseya ransomware attack sets off race to hack service providers -researchers



DuckDuckGo’s Email Protection Service Explained



How to Fix (and Prevent) the Latest ChromeOS Bugs

Chrome OS 91's newest update is locking Chromebook users out of their devices.



Data Breach Culprits: Phishing and Ransomware Dominate

Unauthorized Access and Malware Also Among Top Causes, UK Privacy Watchdog Reports



Monitor your home's temperature and humidity with Raspberry Pis and Prometheus

Instrument a Prometheus application with Python on Raspberry Pis to collect temperature sensor data.



Machine Learning made easy with Raspberry Pi, Adafruit and Microsoft



An old-style distro doing new things

Distro Walk – Void Linux

Void Linux offers a unique distribution with a lower barrier to participation that is easy to manage.



How Do I Move an Off Screen Window?


Back to Top



Back to Top


The Chicago Computer Society
P.O. Box 159                      (708) 588-0385
LaGrange, IL 60525-0159  

Page Updated
August 17, 2021

Copyright © 1995- 2011, The Chicago Computer Society, All Rights Reserved.
Send changes to
Jerry Sass Webmaster for CCS