Blog

You are here: Home » Blog

How to make Windows 10 look and feel like Windows 7

By |2019-09-08T14:04:22-04:00September 8th, 2019|Categories: Tech News|Tags: , |

How to make Windows 10 look and feel like Windows 7. Windows 10 is arguably one of the significant improvement over the previous Windows 7. Being the latest version, Windows 10 has seen a lot of significant improvements in security, performance, and efficiency. It certainly has lots of new features like Cortana, Universal apps, Classic Start [...]

Why JavaScript developers are choosing TypeScript

By |2019-09-08T13:26:44-04:00September 8th, 2019|Categories: Tech News|Tags: |

Why JavaScript developers are choosing TypeScript. TypeScript is exploding, say analysts. Microsoft might have taken a friendlier approach to Linux under CEO Satya Nadella, but one thing that hasn't changed since the days of ex-CEO Steve Ballmer is the company's focus on "developers, developers, developers". This week Microsoft revealed at its Build developer conference a Microsoft-made [...]

Hackers attack Confluence Servers, hijack power for cryptocurrency mining

By |2019-09-08T19:07:24-04:00September 8th, 2019|Categories: Tech News|Tags: , , , , , , |

Hackers attack Confluence Servers, hijack power for cryptocurrency mining. Illicit Monero mining is the goal. According to Trend Micro, attackers are harnessing CVE-2019–3396, a bug present in the Widget Connector macro in Atlassian Confluence Server, which permits path traversal and remote code execution via server-side injection. Atlassian released a patch on March 20, 2019, to resolve the security flaw [...]

Dharma Ransomware Uses Legit Antivirus Tool To Distract Victims

By |2019-09-08T14:11:13-04:00September 8th, 2019|Categories: Tech News|Tags: , , , , |

Dharma Ransomware Uses Legit Antivirus Tool To Distract Victims. A new Dharma ransomware strain is using ESET AV Remover installations as a "smoke screen" technique designed to distract victims while their files are encrypted in the background as detailed by Trend Micro. The ransomware is pushed by the attackers on their targets' computers using a [...]