Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Microsoft's Remarkable Pivot: Windows 10 Abandons Privacy
Newest First  |  Oldest First  |  Threaded View
dieselnerd
dieselnerd,
User Rank: Strategist
9/3/2015 | 12:24:59 PM
Pivot This, MSFT
Glad I'm a slave to the Redmond Beast only at work these days, with Linux the primary OS at home, the dust blown off Win7Pro only when I must. Managed to avoid Win8 like I managed to avoid Vista (and Me before that); with luck Win10 will never make it into the house either.
Juif
Juif,
User Rank: Apprentice
9/3/2015 | 8:48:29 AM
Re: Good Advice
I hate W10 for that, now we are the product !
dfunk1
dfunk1,
User Rank: Strategist
9/3/2015 | 7:52:06 AM
If it's free
If it's free, then the product is you.
melgross
melgross,
User Rank: Apprentice
9/2/2015 | 11:35:19 AM
Apple's data collection
Apple has never collected all of that data. It isn't that they want to stop. So let's get that right, at least. Google has been the worst, with Facebook second, because they are advertising agencies. Their "products" are just their way of gathering private info and placing it on their properties. Microsoft has mostly been a software company, selling software. But that situation is changing. In their rush to rival Google as a search engine, they had to collect a lot of data as well, in order to pay for it, and still lose hundreds of millions on Bing every year. But with them needing to give Windows away, a major way they're going to make money in the future, is with advertising, which we will be seeing in the OS itself, for the first time, as well as personal data collection that Microsoft can sell. A few years ago, Eric Schmitt, then CEO of Google (now chairman), said in a speech called "creepy", that "Soon, Google will know more about you than you will know about yourself, and will make decisions for you before you know you want to make them." Around the end of 2013 or 2014, Microsoft's Ballmer made the same statement about Microsoft. With Win 10, and now Win 7 and Win 8, we're seeing the truth of that. I don't worry about the pitiful amount of data about us that the NSA collects, which is really just the contacts we make on our phones every month, which is the data we see in our phone bills. I worry about Facebook, Google, Microsoft, Yahoo and others, whose business depends upon their collection of ever more data about us that the NSA can only dream of collecting. And if the NSA, or other law agency wants that data, it's just a warrant away, and maybe not even a warrant away. People would do well to remember that.
RyanSepe
RyanSepe,
User Rank: Ninja
9/2/2015 | 11:30:31 AM
Good Advice
This is good to know. I figured this would be the case in most cases because the ease of use principle is held in almost just as high of a regard with the functionality of the software.


I will definitely be taking off Wifi Sense. But besides that I would just suggest tweaking the other settings within Cortana and Live Account Security. Removing them entirely takes away from the overall functionality of the software and isn't that why we upgrade in the first place?


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...