By continuing to use the site or forum, you agree to the use of cookies, find out more by reading our GDPR policy

A bug in Windows 10 May 2019 Update (version 1903) might be distorting graphics or representing color improperly on some monitors. If the graphics or images are distorted or messed up in some way on your device, it might be because of the Windows 10 version 1903 update. According to various reports, Windows 10 version 1903 has a compatibility issue with certain GPU where ICC profiles may not work properly for users. The result is poor image quality and abnormal gradient graphics with faint vertical lines at regular intervals. The bug also renders tones when a color profile is loaded, or when the Calibration Loader task is invoked. The color distortion issue has been confirmed by several Windows 10 users in Reddit and other forums, including Nvidia forums. In a support document, display and monitor manufacturer Eizo has confirmed that the bug is also hitting their displays and monitors after the May 2019 Update. The calibration device manufacturer DisplayCal has also confirmed the color distortion after Microsoft’s latest feature update. According to DisplayCal, Calibration loading may stop working in Windows 10 version 1903. The bug affects both the Windows-internal calibration loader and 3rd party calibration loaders. Fortunately, Microsoft appears to have deployed a fix with Windows 10 KB4501375 (Build 18362.207). Installing Windows 10 Build 18362.207 could help users resolve the color distortion problem. “Addresses an issue that may cause Night light, Color Management profiles, or gamma correction to stop working after shutting down a device,” the changelog reads. For tips on a possible workaround stop by OUR FORUM.

The U.S. Federal Bureau of Investigation (FBI) issued a warning on Twitter regarding sextortion campaigns used by scammers to target young people from all over the United States. "The internet connects you with the world. Do you know who in the world is connecting with you? Sending one explicit image can start a scary cycle," says the FBI in a tweet shared on July 3. The agency also added to their alert the fact that sextortion scams usually rely on photos sent by potential victims to people they don't know in real life. In a story published on FBI's official website at the end of May, the agency states that it is currently "seeing a significant increase in activity involving sextortion—a federal crime that happens when an adult coerces a child to produce sexually explicit photographs or video of themselves and then send it to them over the Internet." The scammers who operate sextortion campaigns that impact kids usually make use of a variety of channels to contact their young targets from social media and gaming platforms to video and dating chat apps. FBI Special Agent Brian Herrick stated that "the FBI is seeing an increasing number of cases start on connected gaming systems, where the competition is intense and the offer of game credits or codes is enough to convince a child to create an explicit image." Extortionists also employ several methods to coerce the kids to send them explicit content in the form of images or videos, from flattery and attention to involving romantic interest in their online relationship, and even offering money and various other valuable items, with threats also being involved in many cases if no other measures are successful. "The second the criminal gets a picture, that child’s life is going to be turned upside down," said Special Agent Ryan Barrett, who worked on the Finkbiner’s sextortion case from April 2012."These people are relentless. They don’t care." Get better informed by visiting OUR FORUM.

Less than two weeks ago, U.S. Cyber Command launched an offensive on Iran to disable computer systems used by the country's Revolutionary Guard Corps to control rocket and missile launches. Now, the agency has issued an unprecedented public warning that is has discovered the "active malicious use" of a Microsoft Outlook vulnerability that appears to be linked to Iran. When the U.S. opted for an offensive cyber strike instead of a more conventional missile strike in retaliation for the downing of a U.S. drone, it was painted as a backtrack but, as I reported at the time, it was actually a game changer. If the U.S. has used offensive cyber to compromise Iran's core command and control systems, it completely changes the battlefield dynamic. It was also notable that the U.S. decided to put the cyber strike into the public domain. Iran does not play in the same league as Russia or China when it comes to cyber capabilities. The country's ability to retaliate against the U.S. government is limited. But, for Iran, there are many easier targets. And one of the fears expressed by analysts after the military cyber strike was that Iran might elect to increase its cyber activity in the broader non-governmental sector. And so to this warning, and Cyber Command tweeting that it has discovered the "use of CVE-2017-11774 and recommends immediate patching," adding a disabled link to the suspected delivery URL. The vulnerability was first discovered by Sensepost and patched in 2017—so if an Outlook install has been patched there is no concern. But we all know—and countless press articles have run this year alone—that many systems remain unpatched and vulnerable, opening up entire networks to potential bad actors. The bug essentially opens a door for malicious code to escape from Outlook into the underlying operating system. And, the point at issue here is that this vulnerability has been linked to Iran before.  As reported by ZDNet, the bug was first exposed in 2017, "but by 2018, it had been weaponized by an Iranian state-sponsored hacking group known as APT33 (or Elfin), primarily known for developing the Shamoon disk-wiping malware." For more turn to OUR FORUM.