med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

362
active users

#securityupdates

0 posts0 participants0 posts today

Still on Windows 10? Microsoft will offer 1 extra year of security updates for free—but only if you back up your data with a Microsoft account. 💻

The catch? You're trading convenience for control. 🧾

Windows 10 lives on... but at what privacy cost?

@arstechnica
@ArsTechnica@flipboard.com

arstechnica.com/gadgets/2025/0

Ars Technica · Microsoft extends free Windows 10 security updates into 2026, with strings attachedBy Andrew Cunningham

New European Union rules require phone makers to offer security updates for 5 years, make spare parts available for 7 years, and include repairability and durability labels. But a last-minute change means that displays don't need to be user-replaceable. ifixit.com/News/111220/ecodesi #Europe #Ecodesign #repairability #SecurityUpdates #Sustainability

iFixit · Ecodesign for Smartphones: Two Steps Forward, One Step BackBy Manuel Haeussermann

Lilbits: A cyberdeck with a 2 inch CRT display, a 25.3 inch E Ink monitor, and the final nail in the coffin for LG’s smartphones

Cyberdecks are portable computers that often have a retro-futuristic design. Often that’s achieved by hobbyists who combine modern hardware (like a Raspberry Pi or a similar single-board computer) with vintage tech.

But one of the coolest… and possibly most useless cyberdeck’s I’ve seen so far takes things to another level by fusing a 2 inch black and white CRT display from 1980s-era Sony […]

#alderLakeN #crtDisplay #cyberdeck #intel #lg #lilbits #onyxBoox #onyxBooxMiraPro #osUpdates #raspberryPi #securityUpdates #sonyWatchman #twinLake #watchman

Read more: liliputing.com/lilbits-a-cyber

@JessTheUnstill @bohwaz @punkfairie @ajsadauskas @tomiahonen @fuchsiii Exactly...

Coincidentially, that's why #Android (and #iOS) doesn't let users have #root access because billions of devices owned by mostly "#TechIlliterates" that hardly get #SecurityUpdates would be an even bigger risk if they didn't boot a locked-down #ROM image, thus only allowing for #malware in user-privilegued userspace!

Cuz having a mobile OS that shoves everything through #Tor and only allows #userspace-Apps in the form modern web technologies would be a big #security and #privacy gain.

  • Not to mention #amd64 is on it's way out and inevitably they gotta have to transition to supporting #arm64 and eventually #RISCv-#64bit at some point.
#amd64#arm64#riscv
Replied in thread

@Starcade I'm still using #Win10 on an old laptop but I've got a #VPN w/security software built in & I have other #antivirus & #antimalware apps installed on my laptop as well.

So, I have no intention of paying #MSFT anything for any future #Securityupdates

Fact is, if I'm using software that already "works" for me, I avoid updating it, despite multiple notifications about available updates.

Part of this is laziness but part of it is also that I've experienced problems with installing #Updates that were #Buggy & caused me problems.

So, as far as software is concerned, live by the saying: "If it isn't broken, don't fix it." 🤷‍♂️

Replied in thread

@GrapheneOS Well, you've to ask #Google and #Fiarphone that and consider invoking #Regulators like @EUCommission, @kartellamt@social.bund.de and others in that matter.

Which again proves my point:

  1. #AllGAFAMsAreEvil and NOONE shoud've ever trusted them with anything!

  2. The #Android ecosystem is fucked up and there is a need for #vendors to refuse to bow before #Google and actually do #secure & #repairable devices.

Again: You seem angry at the wromg person if that means you're angry at me.

The question to me is how is #GrapheneOS gonna go about this?

  • Cuz we both know Google can afford to go "maximum asshole" on you [the Grpahnene OS Project] and even in the worst case their legal department won't even notice this whole shitshow even if miraculously by the wounders of everyone from @eff to @fsf to @noybeu and @CCC forcing Google to literally support and endore GrapheneOS, because by the time any binding court ruling would be enforced, Google would've choked the project out of the market.

So my question is when will you get forward and work with other #vendors instead of tying your project to Google-specific and thus sorta-proprietary implementations?

[...] Pixel targets have a lot of device-specific hardening in the AOSP base along with some in GrapheneOS which needs to be ported over too. For example, various security features in the kernel including type-based Control Flow Integrity (CFI) and the shadow call stack are currently specific to the kernels for these devices. [...]

To me that sounds like some very serious #VendorLockIn you're stuck in, and now it bites you in your rear...

I hate to say it, but #ToldYaSo sadly happened!

I guess you gotta have to bootstrap it from scratch starting with #toybox + musl / #linux sooner or later...

Not to seem like an asshole, but I do sincerely wish GrpaheneOS and it's team only the best of luck and that the issue gets fixed sooner than later, because this #Vendor #LockIn is a major issue [and yes I do blame the Device Vendors that shit out unmaintained garbage] so unless you can afford the legal cost of actuall enforcing #EU laws re: #SecurityUpdates and force Vendors like #Fairphone to actually follow their claims re: #Security and #Updates, this won't move anywhere.

  • Yes I know you don't have that money and I don't expect this to be the case!

I do however also don't expect you to find a magical solution. My point is that there needs to be a change of strategy, and relying on Hardware you neither own nor control in the sense of Stakeholding isn't going to provide you with the necessary stability.

  • Because Google is a [pulicly traded] #Corporation and Corporations are explicity nobody's friend!
GrapheneOS logo
GrapheneOSGrapheneOS build documentationBuilding instructions for GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.

pirg.org/oregon/take-action/te
End of '25 Microsoft will halt #Windows10 free security fixes & updates . As many as 400 million perfectly good computers that can't upgrade to Windows 11 might be thrown out.

~40% of PCs can't upgrade to #Windows11, even if users want to. So when MS stops providing #securityupdates, those computers will either be insecure to keep using, or else turn into junk and get thrown out. >1/4 of #electronicwaste is #recycled, so most of those machines will end up in landfills.

OSPIRGTell Microsoft to extend free support for Windows 10If Microsoft ends free support for Windows 10, as many as 400 million perfectly good computers might be thrown out.

Hey folks!

Heads up: we’ve rolled out security updates for Element X Android (0.4.12) & iOS (1.6.7) to address a High severity vulnerability.

Users’ privacy matters to us so we believe it’s important to be transparent when these things occur.

Check out our latest blog post to find out more details, and update your apps to stay secure.

element.io/blog/security-relea

"🚨 #CitrixHypervisor Security Alert! 🚨"

Citrix has identified several security issues in Citrix Hypervisor 8.2 CU1 LTSR that could potentially compromise system security. These issues include AMD-based host compromise through a PCI device (CVE-2023-34326), host compromise with specific administrative actions (CVE-2022-1304), host crashes or unresponsiveness (CVE-2023-34324), and crashing of other VMs on AMD-based hosts (CVE-2023-34327). Additionally, a security problem affecting certain AMD CPUs, which may allow code in a guest VM to access previous integer divides in code running on the same CPU core, has been disclosed as CVE-2023-20588.

Mitigating factors include the dependency on AMD CPUs and the use of specific features. Customers not using AMD CPUs or PCI passthrough features may not be affected by some of these issues.

Citrix has released multiple security updates for Citrix Hypervisor 8.2 CU1 LTSR. Several vulnerabilities have been discovered:

  1. CVE-2023-34326: A threat that allows malicious privileged code in a guest VM to compromise an AMD-based host via a passed-through PCI device.
  2. CVE-2022-1304: A vulnerability that can compromise the host when a specific administrative action is taken.
  3. CVE-2023-34324: A flaw that can cause the host to crash or become unresponsive.
  4. CVE-2023-34327: A vulnerability that can cause a different VM running on the AMD-based host to crash.
  5. CVE-2023-20588: A security issue affecting certain AMD CPUs, allowing code in a guest VM to determine values from previous integer divides in code running on the same CPU core.

Citrix has provided hotfixes for these vulnerabilities. Affected users are advised to install these updates and follow the provided instructions. For more details, check the official Citrix article here.

Tags: #Cybersecurity #Citrix #Hypervisor #Vulnerability #AMD #CVE2023 #CVE2022 #SecurityUpdates 🛡️🔧

support.citrix.com Citrix Hypervisor Multiple Security Updates Citrix Hypervisor Multiple Security Updates

Here in Canada, the Bluelink app is not working. Apparently, server side, th app must be on version 2.0.8 whereas the Canadian app store only has 2.0.7 available.

I do not understand how global companies fail to understand and plan for these types of mandatory updates. I guess as long as the app is available in the US and SK, the update will be considered successful?

Very frustrating.

Apple now has Rapid Security Updates available for users running iOS 16.4.x … they are smaller and faster updates for security vulnerabilities.

The update download took like 10 seconds but preparing the update took around one and a half minutes. The update itself was very fast and the phone restarted and was done in around 30 seconds …

The current update is 16.4.1 (a) and if you want to be sure that you are protected against the latest vulnerabilities, you might want to give it a try …

There’s apparently one for macOS as well, but I haven’t installed that yet.

#Apple #iOS #macOS #SecurityUpdates
a.farook.orgAkkoma

Apple released the first Rapid Security Response updates for iPhone, iPad and Mac today. Rapid Security Response updates is a new feature designed to provide security updates to Apple devices without waiting for a full software update. This should help keep Apple devices more secure. Updates are rolling out over the next 48 hours. Make sure to update when it is available.

#cybersecurity #apple #mac #iphone #ipad #securityupdates

macrumors.com/2023/05/01/rapid

MacRumorsApple Releases Rapid Security Response Updates for iOS 16.4.1 and macOS 13.3.1By Juli Clover