
Microsoft: Sicherheitsfunktion blockiert Windows-10-Mai-Update
Einige können nicht auf Windows 10 2004 aktualisieren. Das liegt an eingeschalteter Speicherintegrität und inkompatiblen Bildschirmtreibern. (Windows 10, Microsoft)

Just another news site
Einige können nicht auf Windows 10 2004 aktualisieren. Das liegt an eingeschalteter Speicherintegrität und inkompatiblen Bildschirmtreibern. (Windows 10, Microsoft)
Bis zu 10,8 GBit/s im Downstream per 6-GHz-Band: Qualcomms WiFi-6E-Bausteine erreichen hohe Geschwindigkeiten. (802.11ax, Smartphone)
Researchers urge caution on genetic studies early in outbreaks.
Enlarge / KIRKLAND, Wash.: A patient is shielded as they are put into an ambulance outside the Life Care Center of Kirkland on March 7, 2020. Several residents have died from COVID-19, and others have tested positive for the novel coronavirus. (credit: Getty | Karen Ducey)
When cases of COVID-19 began popping up in Washington state in late February, researchers were quick to dive into the genetics of the viruses infecting residents. Based on what they knew at the time, they hypothesized that those cases in late February were genetically linked to the very first case found in the state—one in a person who arrived in Washington on January 15 after traveling from Wuhan, China, where the outbreak began. The case was also the first infection identified in the whole of the United States.
If correct, the genetic hypothesis linking the late February cases to that very first case meant that early efforts to contain the pandemic coronavirus—isolating the initial patient, tracing contacts, etc.—had failed spectacularly. It also meant that the virus, SARS-CoV-2, had been cryptically circulating in the state for six weeks. And that would mean that, in addition to those early cases, there were potentially hundreds or thousands of others out there, undetected and possibly spreading the infection further.
The hypothesis played into state officials’ decision to issue some of the country’s earliest social-distancing measures. But now that we know far more about the genetics of circulating SARS-CoV-2 viruses, that hypothesis appears to be wrong.
Cisco is one of many to get bitten by vulnerabilities in open source Salt manager.
Enlarge (credit: Prayitno / Flickr)
Six servers Cisco uses to provide a virtual networking service were compromised by hackers who exploited critical flaws contained in unpatched versions the open source software service relies on, the company disclosed on Thursday.
The May 7 compromise hit six Cisco servers that provide backend connectivity to the Virtual Internet Routing Lab Personal Edition (VIRL-PE), a Cisco service that lets customers design and test network topologies without having to deploy actual equipment. Both the VIRL-PE and a related service, Cisco Modeling Labs Corporate Edition, incorporate the Salt management framework, which contained a pair of bugs that, when combined, was critical. The vulnerabilities became public on April 30.
Cisco deployed the vulnerable servers on May 7, and they were compromised the same day. Cisco took them down and remediated them, also on May 7. The servers were:
Wir sollen unsere Hände waschen und Mundschutz tragen, aber wie oft desinfizieren wir unsere Smartphones, die wir überall dabei haben?
Warum gibt es in New York City 21.000 Corona-Tote und in San Francisco nur 40?
Operator sent out a series of increasingly frantic Morse Code messages as the ship sank
Enlarge / View of the bow of the RMS Titanic photographed in June 2004 by the ROV Hercules during an expedition returning to the shipwreck. (credit: NOAA/Institute for Exploration/University of Rhode Island (NOAA/IFE/URI))
When RMS Titanic struck an iceberg on April 14, 1912, crew members sent out numerous distress signals to any other ships in the vicinity using what was then a relatively new technology: a Marconi wireless telegraph system. More than 1,500 passengers and crew perished when the ship sank a few hours later. Now, in what is likely to be a controversial decision, a federal judge has approved a salvage operation to retrieve the telegraph from the deteriorating wreckage, The Boston Globe has reported.
Lawyers for the company RMS Titanic Inc.—which owns more than 5,000 artifacts salvaged from the wreck—filed a request in US District Court in Alexandria, Virginia, arguing that the wireless telegraph should be salvaged because the ship's remains are likely to collapse sometime in the next several years, rendering "the world's most famous radio" inaccessible. US District Judge Rebecca Beach Smith concurred in her ruling, noting that salvaging the telegraph "will contribute to the legacy left by the indelible loss of the Titanic, those who survived, and those who gave their lives in the sinking."
However, the National Oceanic and Atmospheric Administration (NOAA) is fiercely opposed to the salvage mission. The agency argues in court documents that the telegraph should be left undisturbed, since it is likely to be surrounded "by the mortal remains of more than 1500 people." Judge Smith countered in her decision that the proposed expedition meets international requirements: for instance, it is justified on scientific and cultural grounds and has taken into account any potential damage to the wreck.
Shortly after the COVID-19 pandemic started spreading across the globe and leading to stay-at-home and social-distancing orders affecting millions of people, folks started finding new ways to come together virtually. Video conferencing app Zoom saw an …
Shortly after the COVID-19 pandemic started spreading across the globe and leading to stay-at-home and social-distancing orders affecting millions of people, folks started finding new ways to come together virtually. Video conferencing app Zoom saw an …
Sandworm group uses emails to send root commands to buggy Exim servers.
Enlarge (credit: Lino Mirgeler/picture alliance via Getty Images)
A Russian hacking group tied to power-grid attacks in Ukraine, the world’s most destructive data wiper worm, and other nefarious Kremlin operations is exploiting a vulnerability that allows it to take control of computers operated by the US government and its partners.
In an advisory published on Thursday, the US National Security Agency said that the Sandworm group was actively exploiting a vulnerability in Exim, an open source mail transfer agent, or MTA, for Unix-based operating systems. Tracked as CVE-2019-10149, the critical bug makes it possible for an unauthenticated remote attacker to send specially crafted emails that execute commands with root privileges. With that, the attacker can install programs of their choosing, modify data, and create new accounts.
A patch CVE-2019-10149 has been available since last June. The attacks have been active since at least August. NSA officials wrote: