Product Promotion Network


Microsoft wants to force Windows 10 Mail users to use Edge for email links

Microsoft is testing a new change to its future version of Windows 10 which will probably annoy anyone using the operating system. The software giant revealed today that “we will begin testing a change where links clicked on within the Windows Mail app will open in Microsoft Edge.” The change means if you have Chrome or Firefox set as your default browser in Windows 10, Microsoft will simply ignore that and force you into Edge when you click a link within the Mail app.

It’s a ridiculous change, that’s similar to Microsoft forcing Cortana users to use Bing search and open results in the Microsoft Edge browser instead of other browsers that are set as default. “As always, we look forward to feedback from our WIP community,” says Microsoft’s Dona Sarkar in a blog post today. I’m sure Microsoft will receive a lot of feedback over this unnecessary change, and we can only hope the company doesn’t ignore it.

Microsoft has been desperately trying to convince Windows 10 users to switch from Chrome to Edge.

The software maker has made it difficult to switch the default browser in Windows 10, created videos to trash Google’s Chrome battery life claims, and even used a variety of annoying ads within Windows 10 itself to try and promote Edge.

None of these efforts have worked, though. Chrome is still the top browser on desktop PCs.

Operation Honeypot: How Bitdefender Gets Malware To Come In From The Cold

The term ‘honey pot’ may well have been invented by ex-British intelligence man and spy novelist John le Carre, but it’s a term that’s stuck – and is equally applicable in today’s virtual world. Cyber security specialists and researchers at Bitdefender[1] regularly set up honeypots of their own, as part of their ongoing efforts to spot and analyse how new and emerging types of malware operate. Broadly speaking, digital honeypots work like this; a piece of code imitates a node on the Internet but makes itself deliberately vulnerable, so people wanting to defraud, hack into or otherwise damage the intellectual property infect it – or a program written to specifically infect such vulnerabilities does what it’s designed to do.

Security companies like Bitdefender[2] leave these honeypot nodes around and record data on how viruses behave, then secure them again once they’ve gleaned enough information. Importantly, the recorded data will tell Bitdefender whether an attack is routine or something more unusual and innovative, requiring a new approach in defense – all of which helps in the ever-evolving war against cybercrime[3]. This has never been more important because criminal actors have a new way of getting into people’s networks[4]: the Internet of Things (IoT) is offering them more poorly-guarded points of entry than ever before.

IoT, in case you’re not familiar with the buzzphrase, is a term for a huge amount of items that are connected to the Internet but which may not have a display. If you have security cameras, baby monitors you can ‘see’ through your phone, fire sensors, a connected thermostat, lightbulb, smart home or office hub, then congratulations, you’re part of the Internet of Things. And it’s not as secure as you might have hoped. “Many times, these devices are battery powered and feature lightweight CPUs that barely can handle the things the IoT device has been designed to do,” says Bogdan Botezatu, senior e-threat analyst at Bitdefender[5].

Security, he says, would be an extra ‘feature’ which would complicate the design or increase the cost of the device which would then become more complex to set up. “For instance, not forcing a rule for complicated passwords or not forcing the user to change the default username and password can leave them vulnerable to outsiders,” he says. The lack of regulation in this sector combined with market forces inevitably means mistakes get made. In lieu of robust regulation[6], the best thing for users to do is remain vigilant.

For the security industry, vigilance extends to the digital equivalent of missions behind enemy lines, with honeypots forming a great first line of defence. “While a honeypot at the office or at home is nice, honeypots placed in financial, education, military or other sensitive verticals can attract a wider range of cyber-criminals with fixed, specific goals in mind,” says Botezatu. “A honeypot in a financial institution can inform us in real time about a potential digital robbery from within the bank’s network and so on.” None of this is about abandoning your automated home system or disconnecting your smart electricity and gas meters from the Internet.

It is about taking basic preventative measures – changing your username and password – and closing the door on people who will walk through and help themselves if it’s been left open. Meanwhile Bitdefender’s honeypots will go a long way to catching the more sophisticated attempts on security of banks and other vital bodies. You can browse and sign up for Bitdefender products, including the award-winning Bitdefender Internet Security product, here[7].

Le Creuset Honey Pot, Alessi Glass Family goblet[8]” by Didriks[9] is licensed under CC BY 2.0[10].


  1. ^ Bitdefender (
  2. ^ Bitdefender (
  3. ^ in the ever-evolving war against cybercrime (
  4. ^ have a new way of getting into people’s networks (
  5. ^ Bitdefender (
  6. ^ In lieu of robust regulation (
  7. ^ You can browse and sign up for Bitdefender products, including the award-winning Bitdefender Internet Security product, here (
  8. ^ Le Creuset Honey Pot, Alessi Glass Family goblet (
  9. ^ Didriks (
  10. ^ CC BY 2.0 (

Amazon recalls Basic range portable chargers over fire risk

Amazon is recalling various portable power bank chargers from its Amazon Basics range, following reports of them catching fire and burning users. The online shopping retailer announced the recall in collaboration with the US Consumer Product Safety Commission (CPSC), a safety watchdog across the pond. The decision was made after 53 complaints about the chargers were made to Amazon, including one report of chemical burns due to contact with battery acid and four of damage to property.

The recall mostly affects consumers in the US and Canada, but Amazon confirmed to Which? that the chargers had been on sale in the UK. It didn’t tell us how many had been sold in the UK, though. This follows a separate case in 2016 when Amazon recalled chargers for Kindle Fire tablets over a risk that users could be electrocuted by them.

Keep reading to find out the specific power bank chargers affected, and what to do if you own one.

Which Amazon Basics power banks are affected by the recall?

The CPSC says that around 260,000 units of Amazon Basics power banks are affected, with various battery sizes. This includes 16,100mAh; 10,000mAh; 5,600mAh; 2,000mAh with micro USB cable; 3,000mAh and 3,000mAh with USB micro cable models. If you’re unsure if you have one of these, the charger should have one of the following ID numbers – B00LRK8EVO, B00LRK8HJ8, B00LRK8I7O, B00LRK8IV0, B00LRK8JDC or B00ZQ4JQAA – printed on the back.

What should I do if I own one?

The CPSC said that anyone who owns one of the chargers should disconnect it and stop using it straight away.

If you purchased one of the chargers, you should have received an email explaining the recall and what to do.

If you can’t see it in your email inbox, check to see if it’s in your junk or spam folder.

If you have one of the chargers but haven’t been contacted, Amazon is advising you to contact its customer services teams on 0800 279 7234.

Product recalls: your rights

For advice on your rights if a product you own is recalled, read our product safety guides[1].

To find out which power banks come closest to delivering the battery power they promise, head to best portable power bank chargers for 2018[2].


  1. ^ product safety guides (
  2. ^ best portable power bank chargers for 2018 (

1 2 3 455