Win10 1809 Updated
This update includes quality improvements.
May 3, 2019—KB4495667 (OS Build 17763.475)
Intel Chipset Drivers
Intel released updated Win10 only Chipset drivers. Gigabyte has newer ones:
Stuff I bookmarked recently. Some off topic, some not:
Dell laptops and computers vulnerable to remote hijacks
A vulnerability in the Dell SupportAssist utility exposes Dell laptops and personal computers to a remote attack that can allow hackers to execute code with admin privileges on devices using an older version of this tool and take over users’ systems.
Dell has released a patch for this security flaw on April 23; however, many users are likely to remain vulnerable unless they’ve already updated the tool –which is used for debugging, diagnostics, and Dell drivers auto-updates.
You don’t need it. Uninstall it.
Increasing transparency and customer control over data (Microsoft)
today we are announcing three ways we’re increasing transparency and control for our customers… First, for all our major products, we’ll categorize the data we collect from devices as either required or optional… Second, we will increase transparency about the data we collect by improving product documentation. Specifically, we’ll ensure that documentation for our major products and services describes the data we collect in each of these categories… Third, we’re introducing a new report that will be published twice a year at privacy.microsoft.com. This report will highlight any new required data collection we believe is fundamental to provide, secure, update or maintain the performance of our products. We will also note instances when we stop collecting certain types of data from devices (because product or service changes mean the data is no longer required). Last, we will explain when we make changes to our data collection in response to new privacy laws, industry standards and regulations.
Pentagon says China’s military using espionage to steal secrets
“China uses a variety of methods to acquire foreign military and dual-use technologies, including targeted foreign direct investment, cyber theft, and exploitation of private Chinese nationals’ access to these technologies, as well as harnessing its intelligence services, computer intrusions, and other illicit approaches,” the Congressionally mandated Department of Defense report said.
“China obtains foreign technology through imports, foreign direct investment, the establishment of foreign research and development (R&D) centers, joint ventures, research and academic partnerships, talent recruitment, and industrial and cyberespionage,” the report added.