May 2020 Archives

Windows 10 "2004"

Microsoft is starting to download/install its newest version of Windows 10 "2004".

Short for 2020 the 4th month.  They delayed its launch due to the Pandemic.

It will be a large download and will take a long time to install on slower computers.

Watch for it!  If you see it offered in Windows Update, be prepared for it to take far longer than other updates.  DO NOT turn off the computer during this update.

Several changes will be apparent,  The "start" pop-up screen will change.  The "live tiles" are being replaced with "icons".  We will have to see how this works.

If you don't already have it, you will get the new Windows Edge browser.  It will probably set itself as the default browser.  That means any "links" you have on the desktop will change the icon to the new Edge Icon.  If you open Google Chrome, you should see a button to "Set Google Chrome as the Default".  That should set them back to what you want.

It will open a Settings screen for the Default Apps.  Under the Web Browser click on the Edge icon and a menu will open.  Click on Chrome and it will change.  You can then close the screen

As this happens I will be updating this post as we learn new things.  Come back and read it again several times.



During this stressful time many people are turning to Zoom to stay connected and work!  I think the Zoom company is doing a great job and of course they are having massive growing pains.  I do not believe they are "spying" on you.

There are however hackers and scam artists.  Here is part of a warning from an authority:

Fake Zoom Downloader Is the Latest Method of Attack on Remote Workers 

Riding on the coattails of the massive rise in popularity in the video conference solution, remote workers new to Zoom need to be wary of where they get the Zoom installer program. 

We've written before about the various types of Zoom-related attacks that have sprouted up over the last two months. The latest chapter in this saga involves an actual Zoom installer program laden with backdoor malware. Available on malicious third-party sites (and not from Zoom's official website), these installers are offered up using phishing emails and spam campaigns designed to direct potential victims to these alternative installers. 

The compromised installer does deliver an installation of Zoom, but also installs the remote access trojan (RAT) WebMonitor, giving attackers remote access to an infected computer via a web browser. 

This kind of attack isn't new, but the rise in necessity and popularity of video conferencing solutions makes Zoom the perfect brand to leverage. 

To avoid becoming a victim, the simple answer here is to remind your users to do these two things:
  1. Don't act on unsolicited emails about software updates, even if they seem pertinent.
  2. Only download software from the official website, if at all.

About this Archive

This page is an archive of entries from May 2020 listed from newest to oldest.

March 2020 is the previous archive.

June 2020 is the next archive.

Find recent content on the main index or look in the archives to find all content.