

Security
Twitch wants to update its security settings
After a long year of looking for ways to protect its users from abuse and harassment, Twitch recently released a recap of its security efforts in 2021. According to the company, this is just a taste. strategies the company will implement in 2022. According to Angela Hession, vice president of global trust and safety at Twitch, the company plans to add updates to its reporting process and user calls.
Indeed, this year, Twitch plans to make several improvements to its platform, starting with adjustments to its suspicious user detection capabilities. For this, the company intends to use artificial intelligence (AI) technologies launched by the company at the end of 2021 to automatically detect people it thinks are repeat offenders.

Twitch also plans to update its harassment policy and share more “better” educational content on its Safety Center and other areas..
Twitch is trying to combat ‘hate raids’
Twitch has been trying to stop automated harassment campaigns or “hate raids” for a while. This is an attack that often targets streamers from fringe communities using thousands of bots to send hateful messages across comms channels. In September 2021, the company charged accounts CruzzControl and CreatineOverdose for running such campaigns.
Although obviously Twitch is still far from being able to eliminate hate attacks, the previous year Twitch had removed a lot of bots and this year it plans to eliminate even more with the updates it intended to bring this year.
Twitch wants to keep its upcoming updates a mystery
Apparently, the company does not yet want to reveal what it plans to improve in its security settings to prevent any sabotage of its efforts. Indeed, even the government supports Twitch’s idea of not disclosing more details about its plans, as the company will do whatever it takes to better communicate with its customers so that they can feel safe on its platform. .
.

Security
Microsoft has released a new version of Windows 11: a new widget panel, copying security codes, improved “Settings” and more

Microsoft has released a major functional update for the Windows 11 operating system. It brings an extensive list of innovations and improvements to various aspects of the system.
Windows 11 22H2 Moment 3 (KB5026446) is currently available as an optional update, but these changes will also be included in the mandatory Patch Tuesday in June.
One of the main features is the new look of the widget panel with three columns – with two columns for news and one for widgets. Microsoft has also included animated icons for widgets on the taskbar. Another big change is the ability to copy security codes from notifications, so if you use two-factor authentication and receive notifications via email (or SMS from your phone), you can immediately copy this code to your clipboard.
The Settings app now has a USB4 page where you can manage docking stations and connected devices. There’s also now a Presence Privacy Settings page that gives you more granular control over features like wake up your PC when approached or lock when you leave. There are also additional settings for brightness, touch keyboard. The Accounts page has also been updated to accurately display the available storage for all of a user’s OneDrive subscriptions.
In File Explorer, context menus now support access keys. Accessibility has also been improved, including support for live subtitles in more languages, as well as support for voice access in more English dialects.
Taskbar improvements include displaying VPN status, and in response to user feedback, there is now an option to display seconds on the clock on the taskbar. The update brings an extra layer of protection against phishing and insecure passwords, and adds support for Bluetooth Low Energy Audio.
This is not a complete list of changes that Windows 11 22H2 Moment 3 brings. There are also improvements that are less noticeable to users, as well as a number of bugs, crashes and shortcomings.
Laptops
Telegram has a vulnerability that allows attackers to use the MacBook’s camera and microphone

Google engineer Dan Reva has discovered a vulnerability in Telegram for macOS that allows attackers to use the laptop’s camera and microphone.
The vulnerability allows to inject a dynamic library (Dylib) with a malicious exploit into Telegram on macOS. With it, attackers will be able to record video from a camera with sound and save the file to a hidden folder on a Mac. Moreover, video and audio recording will work even if the corresponding permissions are disabled.
This is possible because Telegram for macOS does not use Apple’s built-in Hardened Runtime security mechanism.
Reva reported this issue to the Telegram team in February 2022. But the developers did not get in touch and still have not eliminated the vulnerability.
Security
Cybercriminals hacked into a hardware crypto wallet lying in a safe: bitcoins worth 30 thousand dollars were stolen

Kaspersky Lab has discovered and studied a non-trivial cyber incident. The attackers managed to steal 1.33 bitcoins from a hardware wallet (at the time of the study, in the amount of $29,585). Moreover, the theft took place when the device, disconnected from the Internet, was in the owner’s safe.
According to experts, hardware wallets are considered a safer way to store digital assets than software “hot” wallets, since they need to connect separate USB devices to a computer to send cryptocurrency or interact with decentralized financial protocols.
To steal, the attackers had to physically open the device in advance, as well as make changes to the original firmware of the bootloader and the wallet itself. Externally, the hacked crypto wallet worked as usual, but the cybercriminals had already gained full control over it. The Lab said:
Instead of ultrasonic welding, the halves of the wallet were filled with glue and fastened with double-sided tape. In addition, another microcontroller with modified firmware and bootloader was installed instead of the original one. Thus, it turned out that the victim bought a hardware wallet that was already infected, and at the time of purchase, the factory packaging and holographic stickers looked intact and did not arouse suspicion.
The attackers removed the control of protective mechanisms from the firmware. Also, at the initialization stage or when resetting the wallet, a randomly generated seed phrase was replaced with one of 20 pre-created and saved in the fraudulent firmware. Thirdly, if the owner set an additional password to protect the master key, only its first character was used. Thus, in order to pick up the key to a particular fake wallet, the attackers had to go through a total of 1280 options.
Stanislav Golovanov, cybersecurity expert at Kaspersky Lab, explained:
Although hardware wallets are considered one of the safest ways to store cryptocurrencies, attackers have found a way to hack them by selling infected or fake devices. Such attacks can be avoided. We strongly recommend purchasing such devices only from official and trusted sources in order to minimize the risks.
-
Phones6 days ago
Samsung is first again. Introduced smartphone screen that measures heart rate and blood pressure
-
Software7 days ago
Recent Windows 10 update causes PC to brick, Blue Screen of Death, and other crashes
-
Software6 days ago
From settings to clipboard: Microsoft makes chatbot ChatGPT part of Windows 11
-
Laptops6 days ago
Hermes Leather Patch for Laptop Camera and More Introduced