Microsoft Windows update

Winsage
October 7, 2024
Rove Monteux presents a series of conceptual artworks exploring the User Experience with Microsoft Windows, focusing on aspects such as the Blue Screen of Death, Windows Update, and various system errors. Each artwork reflects on user frustrations and experiences with technology, highlighting the unpredictability of the operating system and the resilience of its users.
Winsage
August 28, 2024
AMD's Ryzen 9000 desktop CPUs faced challenges at launch, including delays and lukewarm reviews due to marginal performance improvements. A Windows 11 update (24H2) has provided a significant performance boost for AMD's Ryzen CPUs, with an average gaming performance increase of 11% for the Ryzen 7 9700X and up to 35% for some titles. The update benefits older Ryzen generations as well, such as the Ryzen 7000 and 5000 series, with the Ryzen 7 7700X showing a 10% uplift. This optimization is exclusive to AMD, as Intel users saw no performance improvements. The Ryzen 7 9700X is only 1% faster than the 7700X. AMD's 3D V-Cache models also experienced performance gains. Content creation tasks are expected to see improvements, with a 6% increase noted in the UL Benchmark Procyon Office suite. The Windows 11 24H2 update is anticipated to be publicly available in September or October, with immediate access available through the Windows 11 Insider Program.
Winsage
August 21, 2024
A new data extortion group called Mad Liberator is targeting AnyDesk users by using a counterfeit Microsoft Windows update screen to exfiltrate data from compromised devices. This operation began in July and has attracted attention from cybersecurity experts due to its unique distraction tactic. The attack starts with an unsolicited connection request to a computer using AnyDesk, after which attackers deploy a binary file disguised as a Windows Update. This ruse diverts the victim's attention while data is siphoned from OneDrive accounts, network shares, and local storage. During the process, the victim's keyboard is rendered inactive, allowing uninterrupted data exfiltration that typically lasts around four hours. Mad Liberator does not encrypt data post-exfiltration but leaves ransom notes in shared network directories. There is no evidence of prior interaction or phishing attempts against the targets before the connection request. The group claims to offer assistance in fixing security vulnerabilities and recovering files in exchange for ransom. If a victim does not respond within 24 hours, their name is published on the extortion portal, and if there is no payment within seven days, stolen files are made public. Currently, nine victims are listed on their website.
Search