US security agency, the National Security Agency (NSA), has released new software supply chain guidance to help developers avoid cyberattacks targeting proprietary and open-source software. The new guidance is meant to help US private and public sector organizations defend themselves…
Tag: Software Security – Software Curated
Article: What Does Zero Trust Mean for Kubernetes?
Zero trust is a powerful security model that’s at the forefront of modern security practices. It’s also a term that is prone to buzz and hype, making it hard to cut through the noise. So what is zero trust, exactly,…
New Microsoft Defender Products: Threat Intelligence and External Attack Surface Management
Microsoft recently announced two security products: Microsoft Defender Threat Intelligence and Microsoft Defender External Attack Surface Management. These new products are driven by their acquisition of RiskIQ just over one year ago. Microsoft acquired RiskIQ, a global threat intelligence and…
Apple Removes Scam App That Led to Hijacked Facebook Ad Accounts
Apple has removed an app that it was unknowingly hosting on the App Store that scammed Facebook advertisers and led hackers to use advertisers’ ad budgets to run possibly malicious ads on Facebook’s platforms, Business Insider reports. The app previously…
How Security Resignations Affect Developers’ Workloads
Amid the Great Resignation, security professionals can be hard to come by. The labor shortage impacts organizations overall; it also has a unique effect on developers. This is because, when security and engineering aren’t in tune, organizations don’t operate efficiently.…
Are banks quietly refusing reimbursements to fraud victims?
There are some scary reports popping up that various major financial institutions no longer credit back all fraudulent transactions, even when victims file a police report. If true, it’s a disastrous move that will painfully hurt the institutions. “Under a…
Windows 11 Tests New Privacy Features to See Which Apps Were Spying On You
Windows 11 has a new privacy feature currently testing method that allows you to check which programs you have installed that have recently accessed sensitive hardware on your computers, such as your microphone and camera. Windows 11 New Privacy Feature…
New Microsoft Defender app works on iOS, macOS, Android, Windows
This article has been indexed from Software Security – Software Curated Microsoft just launched Microsoft Defender, a brand new security application that works on any platform. Microsoft Defender has apps for Android, iOS, macOS, and Windows, providing different security features…
Here’s a hidden Android security feature you won’t find on any iPhone
This article has been indexed from Software Security – Software Curated With Apple and Android handset makers constantly jockeying back and forth to one-up each other, the gap between the iPhone and Android user experience has only narrowed in recent…
The best privacy and security apps for Android
This article has been indexed from Software Security – Software Curated Let’s get one thing out of the way right off the bat: If you’re looking for recommendations about Android security suites or other malware-scanning software, you’ve come to the…
3 Gmail tools that stop hackers from breaking into your email
This article has been indexed from Software Security – Software Curated Gmail is such an indispensable service for many people, that of all the apps a hacker could break into this is probably the one that would cause the most…
Microsoft is rolling out these security settings to protect millions of accounts. Here’s what’s changing
This article has been indexed from Software Security – Software Curated To thwart password and phishing attacks, Microsoft is rolling out security defaults to a massive number of Azure Active Directory (AD) users. Microsoft began rolling out security defaults to…
Broadcom Software Shows How the Cyber Defence Centre Will Help in 2022
This article has been indexed from Software Security – Software Curated Enterprises and operators of critical infrastructure have long been on the front lines of cybersecurity. Most recently, new threats have been identified through our Symantec Threat Hunter team, including…
Developing Data Security Practices Before, During, and After Cloud Migrations
This article has been indexed from Software Security – Software Curated You contracted a builder to construct a new house on land you acquired, and he says it’s ready for you to pack up your stuff and move in. Upon…
Red Hat Enterprise Linux 9: Security baked in
This article has been indexed from Software Security – Software Curated Boston: Red Hat Enterprise Linux (RHEL) has been the Linux for business for a generation now. Today, RHEL touches more than $13 trillion of the global economy. Remember when…
Edge’s prospective free VPN would be a tempting reason to ditch Chrome
This article has been indexed from Software Security – Software Curated I’m one of countless people who are foolishly faithful to Chrome. Despite the browser’s horrible rep for privacy, memory-hogging, battery-draining, and supporting Google’s monopoly, I can’t call it quits.…
Why Broadcom Software is Optimistic About Global Standards in Cyber Security
This article has been indexed from Software Security – Software Curated At Broadcom Software, we understand that for CISOs looking for global cyber security standards to support them in their work, recent years may have often felt like an uphill…
Hackers can infect >100 Lenovo models with unremovable malware. Are you patched?
This article has been indexed from Software Security – Software Curated Lenovo has released security updates for more than 100 laptop models to fix critical vulnerabilities that make it possible for advanced hackers to surreptitiously install malicious firmware that can…
So you want to get into cybersecurity? Here’s how
This article has been indexed from Software Security – Software Curated Do you love solving puzzles, enjoy learning new things and hate doing the same thing day-in day-out? If you answered yes to the questions above, you really should consider…
Atlas VPN Debuts MultiHop+ for Added Layer of Internet Privacy and Security
This article has been indexed from Software Security – Software Curated Security-minded internet users looking for another layer of obscurity when traveling in cyberspace can have it with some new tech announced Monday by Atlas VPN. The paid VPN service…
Do you know where your software comes from?
This article has been indexed from Software Security – Software Curated Where does your software come from? That’s one of the questions online users at AskWoody.com have asked in recent weeks. Obviously, this comes up as the world sees what’s…
This new security feature in Windows 11 will help block malicious apps
This article has been indexed from Software Security – Software Curated The internet can be a dangerous place. And, as we download new apps, we’re putting more and more trust into the developers behind them. Unfortunately, some of those apps…
How to protect your Kubernetes infrastructure from the Argo CD vulnerability
This article has been indexed from Software Security – Software Curated Argo CD is a popular open source, continuous delivery (CD) platform for Kubernetes that is used by hundreds of organizations globally. Recently, a serious vulnerability in Argo CD was…
NIST outlines what IoT and software ‘security labels’ could look like
This article has been indexed from Software Security – Software Curated Cybersecurity labels could convey a software product’s or connected gadget’s cybersecurity status. But would these labels be useful, and what is a software product anyway in connected cars and…
Microsoft Defender for Endpoint now spots unpatched bugs in iOS and Android devices
This article has been indexed from Software Security – Software Curated Microsoft’s Defender for Endpoint support for spotting known security flaws in Android and iOS devices has now reached general availability. The threat and vulnerability management features allows admins to…
Researchers develop automated approach to extract security policies from software
This article has been indexed from Software Security – Software Curated A team of UTSA researchers is exploring how a new automated approach could prevent software security vulnerabilities. The team—made up of Ram Krishnan, associate professor in the UTSA Department…
Microsoft beefs up Edge’s security against zero-day attacks
This article has been indexed from Software Security – Software Curated In the latest release of its Edge beta, Microsoft introduced a new way for IT admins to better secure the Chromium-based browser against web-based attacks. The release notes for…
New Chrome security measure aims to curtail an entire class of Web attack
This article has been indexed from Software Security – Software Curated For more than a decade, the Internet has remained vulnerable to a class of attacks that uses browsers as a beachhead for accessing routers and other sensitive devices on…
Windows security in ’22 — you need more than just antivirus software
This article has been indexed from Software Security – Software Curated Do you need antivirus in 2022 — especially when some options now come with a cryptominers built in? Several antivirus vendors — some options free, others, paid — have…
Bug in backup software results in loss of 77 terabytes of research data at Kyoto University
This article has been indexed from Software Security – Software Curated Computer maintenance workers at Kyoto University have announced that due to an apparent bug in software used to back up research data, researchers using the University’s Hewlett-Packard Cray computing…
Integrate security into CI/CD with the Trivy scanner
This article has been indexed from Software Security – Software Curated Attacks on cloud-native infrastructures are on the rise. Research over a six-month period in 2021 shows a 26% increase in attacks on container environments over the previous six months.…
How to prevent sideloading attacks in Windows and Office 365
This article has been indexed from Software Security – Software Curated Attackers know how to manage and monitor our systems better than we do. They will analyze how best to gain entrance to our networks. Attackers have found yet another…
How to prevent sideloading attacks in Windows and Office 365
This article has been indexed from Software Security – Software Curated Attackers know how to manage and monitor our systems better than we do. They will analyze how best to gain entrance to our networks. Attackers have found yet another…
Hackers claim they have cracked the PS5 and obtained all symmetric root keys
This article has been indexed from Software Security – Software Curated Over the weekend, hackers from Fail0verflow claimed to have rooted the PS5. A Sunday tweet states the group has obtained all symmetric PlayStation 5 root keys. It allegedly got…
Securing the Future of Work With Zero Trust
This article has been indexed from Software Security – Software Curated The rapid expansion of remote work has forever changed the face of enterprise cybersecurity, and the effects continue to ripple across the business landscape. As employees and guests return…
5 Trends Driving Application Security Challenges
This article has been indexed from Software Security – Software Curated Applications are a key piece to the digital transformation puzzle. They are also a moving target, as many organizations move current mission-critical apps to the cloud, while developing new…
Firefox on Android is getting a super-useful time saver update
This article has been indexed from Software Security – Software Curated Mozilla is making it easier to access your saved passwords from its browser as part of a new update rolling out soon for Firefox on Android. To commemorate this…
New Google Chrome Zero-Day Exploit Affects Windows, MacOS, Linux Users! Do This To Prevent Hacking
This article has been indexed from Software Security – Software Curated A new Google Chrome zero-day exploit is currently putting the company’s user data at risk. Various cybersecurity experts claimed that this issue could be more dangerous compared to common…
Microsoft Outlook users report frustrating search, security keys bugs
This article has been indexed from Software Security – Software Curated Microsoft is investigating several issues with Outlook for PC that have resulted in unexpected behavior, and even causing breakage in the app’s user experience. According to the software giant,…
Telegram emerges as new dark web for cyber criminals
This article has been indexed from Software Security – Software Curated Telegram has exploded as a hub for cybercriminals looking to buy, sell, and share stolen data and hacking tools, new research shows, as the messaging app emerges as an…
Microsoft Office zero-day vulnerability that allows remote code execution is being actively exploited
This article has been indexed from Software Security – Software Curated Expmon, one of several security firms that reported the zero-day exploit, told BleepingComputer the attack method is 100-percent reliable making it very dangerous. Once a user opens the document,…
OpenVPN client hits version 3.3.1
This article has been indexed from Software Security – Software Curated OpenVPN is a robust and highly flexible VPN daemon. OpenVPN supports SSL/TLS security, ethernet bridging, TCP or UDP tunnel transport through proxies or NAT, support for dynamic IP addresses…
This unsuspecting Lightning cable packs an implant that can log everything you type
This article has been indexed from Software Security – Software Curated We’ve long since been told to be leery of inexpensive third-party phone chargers and USB cables due to their inferior quality. In recent years, we’ve also been warned about…
Logitech’s new Bolt USB dongle boosts the security, reliability and stability of wireless peripherals
This article has been indexed from Software Security – Software Curated Bolt is designed to replace standard Logitech receivers and dongle-free connections. The hardened receiver utilizes Bluetooth Low Energy Security Mode 1, Level 4, meaning all incoming and outgoing traffic…
Kaspersky stopped 5.8 million malware attacks ‘disguised as popular PC games’ in 2020
This article has been indexed from Software Security – Software Curated The pandemic has had a strong influence over the way we use the Internet, with many more people finding solace during lockdowns by turning to streaming and gaming activities.…
Researcher demonstrates bypassing Microsoft’s latest patch for PrintNightmare exploit
This article has been indexed from Software Security – Software Curated PrintNightmare allows a remote attacker to take advantage of a flaw in the Windows Printer Spooler service and execute arbitrary commands with escalated privileges. Microsoft quickly addressed the critical…
Microsoft Defender wants to help your business stomp out internal security threats
This article has been indexed from Software Security – Software Curated Configuring security for internal organization identities and devices is about to get a whole lot easier in Microsoft Defender for Identity as the company plans to add a new…
Checks and Balances: 3 Tips for Securing SaaS Apps
This article has been indexed from Software Security – Software Curated SaaS applications are proliferating, making up the largest cloud spending sector: Gartner predicts the segment will reach $122.6 billion this year. Many CISOs have adjusted their security approach to…
This phishing email is pushing password-stealing malware to Windows PCs
This article has been indexed from Software Security – Software Curated A phishing campaign is delivering a new variant of one of the oldest forms remote access trojan (RAT) malware, in an effort to steal usernames, passwords and other sensitive…
GitHub: Here’s how we’re changing our rules around malware and software vulnerability research
This article has been indexed from Software Security – Software Curated Microsoft-owned GitHub has updated its policies on sharing malware and exploits on the site to better support security researchers sharing so-called “dual use” software — or software that can…
GitHub: Here’s how we’re changing our rules around malware and software vulnerability research
This article has been indexed from Software Security – Software Curated Microsoft-owned GitHub has updated its policies on sharing malware and exploits on the site to better support security researchers sharing so-called “dual use” software — or software that can…
How are anti-malware tools different from regular antivirus?
This article has been indexed from Software Security – Software Curated You may have heard the terms antivirus and anti-malware bandied about here and there in reference to different pieces of security software, and found this confusing. That’s entirely understandable.…
How to Get Developer and Security Teams Aligned
This article has been indexed from Software Security – Software Curated It’s impossible to ignore security in the tech industry. LinkedIn, Google Ads, and now even Instagram are all touting their own security tools, methodologies, and consultancy services. Why then,…
Team builds first hacker-resistant cloud software system
This article has been indexed from Software Security – Software Curated Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, ensuring the safety…
Team builds first hacker-resistant cloud software system
This article has been indexed from Software Security – Software Curated Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, ensuring the safety…
Firefox security update looks to make getting online safer than ever
This article has been indexed from Software Security – Software Curated Mozilla is currently testing a major new security feature for its Firefox browser which will separate every website into its own process. Site Isolation is designed to prevent Spectre-like…
Enterprises need to get smart about iOS security
This article has been indexed from Software Security – Software Curated The XcodeGhost malware attack that allegedly affected 128 million iOS users is an excellent illustration of the kind of sophisticated attack all users should get ready to defend against…
Enterprises need to get smart about iOS security
The XcodeGhost malware attack that allegedly affected 128 million iOS users is an excellent illustration of the kind of sophisticated attack all users should get ready to defend against as platforms become inherently more secure. Designer label malware XcodeGhost was…
Google is launching iOS-style privacy labels for Android apps next year
Google‘s following Apple again by committing to introduce privacy labels for Android apps in the Play Store next year. Google will show these labels for the app on the Play Store under the new Saftey section. It’ll show you what…
A highly sarcastic Android security warning
Read the original article: A highly sarcastic Android security warning Holy floppin’ hellfire, Henry! Have you heard? A terrifying new form of Android malware is running amok — stealing passwords, emptying bank accounts, and drinking all the grape soda from…
Network Encryption, Modern Applications Impact Security Visibility
Read the original article: Network Encryption, Modern Applications Impact Security Visibility There has been massive growth in the encryption of Internet traffic—from 50% in January 2014 to 95% as of March 20, 2021, according to Google’s Transparency Report. This rise…
Don’t fall for this trick that unleashes nasty new Android malware
Read the original article: Don’t fall for this trick that unleashes nasty new Android malware Enough people in the UK have been receiving text messages supposedly about a “missed package delivery” — which prompts the person to install a tracking…
Google releases Chrome 90 with HTTPS by default and security fixes
Read the original article: Google releases Chrome 90 with HTTPS by default and security fixes Google has just released Chrome version 90, bringing a privacy update that automatically adds HTTPS to a URL when it is available. Chrome engineers flagged…
Hackers pushed malware to PHP repositories to open a “backdoor” to websites
Read the original article: Hackers pushed malware to PHP repositories to open a “backdoor” to websites Over the weekend, attackers uploaded two malware payloads to the PHP git server, one would have created a backdoor to PHP-enabled websites. Both were…
Cloudflare’s New API Abuse Detection Services Validate Usage Via Intent
Read the original article: Cloudflare’s New API Abuse Detection Services Validate Usage Via Intent Cloudflare has announced a set of new services that are intended to bolster application security by limiting API abuse. The new API Discovery and API Abuse…
Google wants to standardize digital car key and ID support on Android
Read the original article: Google wants to standardize digital car key and ID support on Android OK, it’s time to head out the door, so make sure you’ve got your phone, keys, and wallet. That’s a lot of items to…
A new Android spyware masquerades as a ‘system update’
Read the original article: A new Android spyware masquerades as a ‘system update’ Security researchers say a powerful new Android malware masquerading as a critical system update can take complete control of a victim’s device and steal their data. The…
Facebook shuts down hackers who infected iOS and Android devices
Read the original article: Facebook shuts down hackers who infected iOS and Android devices Facebook said it has disrupted a hacking operation that used the social media platform to spread iOS and Android malware that spied on Uyghur people from…
Text authentication is even worse than almost anyone thought
Read the original article: Text authentication is even worse than almost anyone thought Everyone has been lecturing IT about how horrible the security is from texting numbers for authentication for years, including me. Now, due to some excellent reporting from…
Better Application Security: Discovery and Vigilance
Read the original article: Better Application Security: Discovery and Vigilance CSO recently labeled the cybersecurity battle as “a war without end.” Not long after the Solarwinds revelations, we learned that tens of thousands, if not hundreds of thousands, of Microsoft…
New ransomware strain exploits Microsoft Exchange security flaw
Read the original article: New ransomware strain exploits Microsoft Exchange security flaw A new strain of ransomware has emerged which exploits a security flaw in Microsoft Exchange servers, signaling potentially damaging consequences from a high-profile hack. Microsoft and other security…
Jamf move improves enterprise security and compliance for macOS
Read the original article: Jamf move improves enterprise security and compliance for macOS Enterprise device management company Jamf has acquired new tools from cmdSecurity designed to help business-using Macs make the platform even more secure and to protect compliance in…
8 mobile security threats you should take seriously
Read the original article: 8 mobile security threats you should take seriously Mobile security is at the top of every company’s worry list these days — and for good reason: Nearly all workers now routinely access corporate data from smartphones,…
Facebook tries to explain the WhatsApp privacy changes one more time
Read the original article: Facebook tries to explain the WhatsApp privacy changes one more time It’s mid-February, which means a brand new privacy policy should have governed Facebook’s WhatsApp instant messaging app by now. All WhatsApp users received prompts to…
Google Meet is getting an important new security feature
Read the original article: Google Meet is getting an important new security feature Video communication tool Google Meet has announced a change to how it manages network traffic, making it easier for administrators to configure their firewalls to allow authorized…
Android Devices Hunted by LodaRAT Windows Malware
Read the original article: Android Devices Hunted by LodaRAT Windows Malware A newly discovered variant of the LodaRAT malware, which has historically targeted Windows devices, is being distributed in an ongoing campaign that now also hunts down Android devices and…
Microsoft Defender ATP is detecting yesterday’s Chrome update as a backdoor
Read the original article: Microsoft Defender ATP is detecting yesterday’s Chrome update as a backdoor Microsoft Defender Advanced Threat Protection (ATP), the commercial version of the ubiquitous Defender antivirus and Microsoft’s top enterprise security solution, is currently having a bad…
Google: Here’s how we’re toughening up Android security
Read the original article: Google: Here’s how we’re toughening up Android security Google has explained how it is trying to improve Android security, and the steps it is taking to tackle common threats. It revealed that 59% of the critical…
When cryptographers looked at iOS and Android security, they weren’t happy
Read the original article: When cryptographers looked at iOS and Android security, they weren’t happy For years, the US government begged Apple executives to create a backdoor for law enforcement. Apple publicly resisted, arguing that any such move for law…
Decoding Microsoft Defender’s hidden settings
Read the original article: Decoding Microsoft Defender’s hidden settings Ask someone what antivirus software they use and you’ll probably get a near-religious argument about which one they have installed. Antivirus choices are often about what we trust — or don’t…
Open source security software Snort gets a major upgrade
Read the original article: Open source security software Snort gets a major upgrade Popular open source intrusion detection and prevention system Snort has received a major upgrade, featuring several new features including the ability to run across multiple environments and…
Google Chrome 88’s new features to make your passwords more secure
Read the original article: Google Chrome 88’s new features to make your passwords more secure Google is rolling out new features to the Chrome 88 browser that will allow users to enjoy safer password protection. The new feature allows users…
5 alternatives to using WhatsApp in 2021
Read the original article: 5 alternatives to using WhatsApp in 2021 Have the recent privacy issues with WhatsApp convinced you it’s time to find a new messaging app? If so, you’ve come to the right place. In this article we’re…
Hackers used 4 zero-days to infect Windows and Android devices
Read the original article: Hackers used 4 zero-days to infect Windows and Android devices Google researchers have detailed a sophisticated hacking operation that exploited vulnerabilities in Chrome and Windows to install malware on Android and Windows devices. Some of the…
Windows 10X will feature clever anti-theft protection to deter thieves
Read the original article: Windows 10X will feature clever anti-theft protection to deter thieves Microsoft is adding a new anti-theft feature to Windows 10X, which will stop people from resetting a stolen device and reusing it. With anti-theft protection turned…
These are the secure chat apps to download now that Facebook ruined WhatsApp
Read the original article: These are the secure chat apps to download now that Facebook ruined WhatsApp Facebook will soon start collecting user data from WhatsApp users, and this time around, there’s no way to opt out of the feature.…
The first Patch Tuesday of ’21; time to delay updates
Read the original article: The first Patch Tuesday of ’21; time to delay updates It’s Patch Tuesday time — that exciting second Tuesday of each month when we turn towards Redmond, WA, hoping for quality updates — and my advice…
Security Vulnerability Detection with Vulnture
Read the original article: Security Vulnerability Detection with Vulnture Airbnb’s information security team wrote about their internal security vulnerability reporting tool called Vulnture. It utilizes the CVE, NVD and other vendor databases and scans infrastructure and the software stack for…
Let’s Encrypt comes up with workaround for abandonware Android devices
Read the original article: Let’s Encrypt comes up with workaround for abandonware Android devices Things were touch-and-go for a while, but it looks like Let’s Encrypt’s transition to a standalone certificate authority (CA) isn’t going to break a ton of…
Android security: Analysis, advice, and next-level knowledge
Read the original article: Android security: Analysis, advice, and next-level knowledge It’s tough to talk about Android security without venturing into sensational terrain. A large part of that is due to the simple fact that the forces driving most Android…
Securely managing the IT workload: In-house or outsource?
Read the original article: Securely managing the IT workload: In-house or outsource? Earlier this week, various macOS sysadmins began reporting that some Apple devices were failing to upgrade to Big Sur version 11.1. Affected users may briefly see the 11.1…
Spotify resets passwords after a security bug exposed users’ private account information
Read the original article: Spotify resets passwords after a security bug exposed users’ private account information Spotify said it has reset an undisclosed number of user passwords after blaming a software vulnerability in its systems for exposing private account information…
Why SD-WAN Isn’t a Security Vulnerability
Read the original article: Why SD-WAN Isn’t a Security Vulnerability As organizations explore SD-WAN as a way to make their networks more configurable and efficient, some will inevitably have questions about the technology’s security.In general, there are two schools of…
Do you have a security tools gap?
Read the original article: Do you have a security tools gap? CISOs have voiced concerns about a possible gap between the tools they need to protect their enterprise vs. the tools they actually have in place. A 2020 survey of…
Hackers can use just-fixed Intel bugs to install malicious firmware on PCs
Read the original article: Hackers can use just-fixed Intel bugs to install malicious firmware on PCs As the amount of sensitive data stored on computers has exploded over the past decade, hardware and software makers have invested increasing amounts of…
11 Android settings that’ll strengthen your security
Read the original article: 11 Android settings that’ll strengthen your security You might not know it from all the panic-inducing headlines out there, but Android is actually packed with powerful and practical security features. Some are activated by default and…
Zoom lied to users about end-to-end encryption for years, FTC says
Read the original article: Zoom lied to users about end-to-end encryption for years, FTC says Zoom has agreed to upgrade its security practices in a tentative settlement with the Federal Trade Commission, which alleges that Zoom lied to users for…
How to give Chrome a super-simple security upgrade
Read the original article: How to give Chrome a super-simple security upgrade Smart security, just like autumn attire, is all about layers. The more effective pieces you have working to protect you, the less likely you’ll be to let a…
The Windows Bad Neighbor vulnerability explained — and how to protect your network
Read the original article: The Windows Bad Neighbor vulnerability explained — and how to protect your network In October 2020, Microsoft patched a set of vulnerabilities that included critical networking bugs CVE-2020-16898 and CVE-2020-16899. Known as “Bad Neighbor” or “Ping…
Is Windows the greatest cyberthreat to the 2020 US election?
Read the original article: Is Windows the greatest cyberthreat to the 2020 US election? If there’s going to be a successful cyberattack on the 2020 U.S election, you can be sure Windows will be involved. It’s the world’s biggest exposed…