Language Selection

English French German Italian Portuguese Spanish

Microsoft, Proprietary Software, and Security

Filed under
Microsoft
Security
  • ‘Picking Winners And Losers’ Here’s How Congress’ Antitrust Legislation Avoids Regulating Many Big Tech Companies

    Last-minute changes to major antitrust legislation working its way through the House appears to exempt several Big Tech companies from being affected by its regulations.

    The legislation, which has been months in the making and was crafted to take on Big Tech monopolies, targets a handful of companies while excluding others that also have massive market power, a leading expert told the Daily Caller News Foundation. Existing federal and state antitrust law already prohibits a wide range of anticompetitive business activity across all industries like unlawful mergers and monopolization.

    “Antitrust law is generally applicable,” Berin Szoka, president of technology policy think tank TechFreedom, told the DCNF in an interview. “That is its chief virtue, which means that it doesn’t pick winners and losers.”

    [...]

    A service must also fall under the specific definition of what the legislation defines as an “online platform.”

    However, between the time Democrats released the bills on June 11 and the time the committee held a markup hearing for the legislation on June 23, the MAU criteria and definition of an “online platform” had been altered. The MAU had been changed from 500,000 to 50 million while the definition of online platform was changed from “operating system” to “mobile operating system.”

    Szoka said the last-minute changes were made to ensure that the vast majority of tech services outside of those produced by Amazon, Facebook, Google and Apple wouldn’t be affected. He noted that the changed bills favored Microsoft, a tech company with enormous market power, since its massive operating software Windows isn’t a “mobile operating system” and its gaming service Xbox Live doesn’t have more than 50 million U.S.-based MAU.

  • Nobelist: scrap patent system and publicly fund drug discovery

    Chemistry laureate George Smith argues a publicly funded system would more than pay for itself by ending monopoly pricing in pharmaceuticals

    [...]

    The vast bulk of the underlying research that leads to new treatments is already funded publicly, he said.

    A case in point were the mRNA vaccines that are so effective against the pandemic. “That technology has depended on hundreds of major discoveries in immunology over at least a century in many dozens of countries, and it of course stands on the shoulders of modern molecular biology and virology,” he said. “The overwhelming majority of this work was done in academic labs with public funding.”

  • Kaseya Case Update | DIVD CSIRT

    On the night of 7-3 (CET), the DIVD CSIRT did a mass scan for online exposed Kaseya VSA instances due to an alarming statement from Kaseya. Kaseya turned off their SaaS services and advised all on-premise customers to turn off Kaseya VSA because it was being used to spread ransomware to various MSPs.

    We were able to react very swiftly because we were already running a broad investigation into backup and system administration tooling and their vulnerabilities. One of the products we have been investigating is Kaseya VSA. We discovered severe vulnerabilities in Kaseya VSA and reported them to Kaseya, with whom we have been in regular contact since then. Additionally, we have, in confidence, also reported these vulnerabilities to our trusted partners.

  • 7 essential privacy tools to stay protected online

    It’s a sad fact that your online presence constantly exposes you to cyberattacks. Hackers, scammers and other bad actors want your login credentials, personal information, financial data and more.

    Ransomware attacks are particularly vicious. These operators steal files and personal data and hold them hostage in exchange for payment. Ransomware attacks are up, particularly in the past year. Tap or click here for more information on these attacks.

    You can’t be immune to attack, but you can take steps to protect yourself. Read on to learn about tools that can beef up your online privacy.

    [...]

    The very browser you use can affect your online security. Big Tech browsers are not the most discrete when it comes to privacy and data collection. Tap or click here for our rundown of the most popular browsers.

    Google Chrome is banning cross-site trafficking, but this doesn’t mean the tech giant won’t track you on its own. Firefox’s default settings include tracker blocking, and the browser offers adjustable global protection levels for its users.

    Edge has default tracking prevention and adjustable levels of protection, similar to Firefox. Microsoft has recently been accused of collecting users’ IP addresses.

    Safari blocks cross-site trafficking out of the box. Safari uses Google as its default search engine, blocks malicious websites and pop-ups, and protects users from malware and phishing scams.

    Brave blocks malware, phishing scams, advertisements, trackers and plug-ins. The company does not store your browsing data. Tap or click here to see the best browsers for privacy ranked.

  • Another day, another WD security flaw

    The researchers found that they could get into a Cloud OS 3 device by remotely updating it with modified firmware. The firmware update functionality is meant to be accessible only to authenticated users, but they were able to get around that because the NAS seemingly has a user on it with a blank password, which they were able to use to authenticate in some cases.

  • Major Swedish Supermarket Chain Hit by Cyberattack [iophk: Windows TCO]

    One of Sweden's biggest supermarket chains said Saturday it had to temporarily close around 800 stores nationwide after a cyberattack blocked access to its checkouts.

    "One of our subcontractors was hit by a digital attack, and that's why our checkouts aren't working any more," Coop Sweden, which accounts for around 20 percent of the sector, said in a statement.

  • Swedish Coop supermarkets shut due to US ransomware cyber-attack

    Coop Sweden says it closed more than half of its 800 stores on Friday after point-of-sale tills and self-service checkouts stopped working.

    The supermarket was not itself targeted by [cr]ackers - but is one of a growing number of organisations affected by an attack on a large software supplier the company uses indirectly.

More in Tux Machines

digiKam 7.7.0 is released

After three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. Read more

Dilution and Misuse of the "Linux" Brand

Samsung, Red Hat to Work on Linux Drivers for Future Tech

The metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. Read more

today's howtos

  • How to install go1.19beta on Ubuntu 22.04 – NextGenTips

    In this tutorial, we are going to explore how to install go on Ubuntu 22.04 Golang is an open-source programming language that is easy to learn and use. It is built-in concurrency and has a robust standard library. It is reliable, builds fast, and efficient software that scales fast. Its concurrency mechanisms make it easy to write programs that get the most out of multicore and networked machines, while its novel-type systems enable flexible and modular program constructions. Go compiles quickly to machine code and has the convenience of garbage collection and the power of run-time reflection. In this guide, we are going to learn how to install golang 1.19beta on Ubuntu 22.04. Go 1.19beta1 is not yet released. There is so much work in progress with all the documentation.

  • molecule test: failed to connect to bus in systemd container - openQA bites

    Ansible Molecule is a project to help you test your ansible roles. I’m using molecule for automatically testing the ansible roles of geekoops.

  • How To Install MongoDB on AlmaLinux 9 - idroot

    In this tutorial, we will show you how to install MongoDB on AlmaLinux 9. For those of you who didn’t know, MongoDB is a high-performance, highly scalable document-oriented NoSQL database. Unlike in SQL databases where data is stored in rows and columns inside tables, in MongoDB, data is structured in JSON-like format inside records which are referred to as documents. The open-source attribute of MongoDB as a database software makes it an ideal candidate for almost any database-related project. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the MongoDB NoSQL database on AlmaLinux 9. You can follow the same instructions for CentOS and Rocky Linux.

  • An introduction (and how-to) to Plugin Loader for the Steam Deck. - Invidious
  • Self-host a Ghost Blog With Traefik

    Ghost is a very popular open-source content management system. Started as an alternative to WordPress and it went on to become an alternative to Substack by focusing on membership and newsletter. The creators of Ghost offer managed Pro hosting but it may not fit everyone's budget. Alternatively, you can self-host it on your own cloud servers. On Linux handbook, we already have a guide on deploying Ghost with Docker in a reverse proxy setup. Instead of Ngnix reverse proxy, you can also use another software called Traefik with Docker. It is a popular open-source cloud-native application proxy, API Gateway, Edge-router, and more. I use Traefik to secure my websites using an SSL certificate obtained from Let's Encrypt. Once deployed, Traefik can automatically manage your certificates and their renewals. In this tutorial, I'll share the necessary steps for deploying a Ghost blog with Docker and Traefik.