<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Dell Archives - Iran News Daily</title>
	<atom:link href="https://irannewsdaily.com/tag/dell/feed/" rel="self" type="application/rss+xml" />
	<link>https://irannewsdaily.com/tag/dell/</link>
	<description></description>
	<lastBuildDate>Thu, 02 May 2019 06:41:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.4</generator>

<image>
	<url>https://irannewsdaily.com/wp-content/uploads/2020/04/cropped-iranlogo-32x32.png</url>
	<title>Dell Archives - Iran News Daily</title>
	<link>https://irannewsdaily.com/tag/dell/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Vulnerability Exposes Dell Laptops, Pcs to Remote Hijacks</title>
		<link>https://irannewsdaily.com/2019/05/vulnerability-exposes-dell-laptops-pcs-to-remote-hijacks/</link>
					<comments>https://irannewsdaily.com/2019/05/vulnerability-exposes-dell-laptops-pcs-to-remote-hijacks/#respond</comments>
		
		<dc:creator><![CDATA[reporter 1222]]></dc:creator>
		<pubDate>Thu, 02 May 2019 06:41:44 +0000</pubDate>
				<category><![CDATA[technology]]></category>
		<category><![CDATA[Dell]]></category>
		<guid isPermaLink="false">https://irannewsdaily.com/?p=92677</guid>

					<description><![CDATA[<p>A vulnerability in the Dell SupportAssist utility exposes Dell laptops and personal computers to a remote attack that can allow hackers to execute code with admin privileges on devices using an older version of this tool and take over users&#8217; systems. Dell has released a patch for this security flaw on April 23; however, many [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2019/05/vulnerability-exposes-dell-laptops-pcs-to-remote-hijacks/">Vulnerability Exposes Dell Laptops, Pcs to Remote Hijacks</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A vulnerability in the Dell SupportAssist utility exposes Dell laptops and personal computers to a remote attack that can allow hackers to execute code with admin privileges on devices using an older version of this tool and take over users&#8217; systems.</p>
<p>Dell has released a patch for this security flaw on April 23; however, many users are likely to remain vulnerable unless they&#8217;ve already updated the tool &#8211;which is used for debugging, diagnostics, and Dell drivers auto-updates, ZDnet reported.</p>
<p>The number of impacted users is believed to be very high, as the SupportAssist tool is one of the apps that Dell will pre-install on all Dell laptops and computers the company ships with a running Windows OS (systems sold without an OS are not impacted).</p>
<p>CVE-2019-3719</p>
<p>According to Bill Demirkapi, a 17-year-old security researcher from the US, the Dell SupportAssist app is vulnerable to a &#8220;remote code execution&#8221; vulnerability that under certain circumstances can allow attackers an easy way to hijack Dell systems.</p>
<p>The attack relies on luring users on a malicious web page, where JavaScript code can trick the Dell SupportAssist tool into downloading and running files from an attacker-controlled location.</p>
<p>Because the Dell SupportAssist tool runs as admin, attackers will have full access to targeted systems, if they manage to get themselves in the proper position to execute this attack.</p>
<p>ATTACK REQUIRES LAN/ROUTER COMPROMISE</p>
<p>&#8220;The attacker needs to be on the victim&#8217;s network in order to perform an ARP Spoofing Attack and a DNS Spoofing Attack on the victim&#8217;s machine in order to achieve remote code execution,&#8221; Demirkapi told ZDNet today in an email conversation.</p>
<p>This might sound hard, but it isn&#8217;t as complicated as it appears.</p>
<p>Two scenarios in which the attack could work include public WiFi networks or large enterprise networks where there&#8217;s at least one compromised machine that can be used to launch the ARP and DNS attacks against adjacent Dell systems running the SupportAssist tool.</p>
<p>Another plausible scenario is in situations where hackers have compromised the users&#8217; local WiFi router, and are in a position to alter DNS traffic directly on the router.</p>
<p>As we&#8217;ve seen in the past few months, hacking routers to hijack DNS traffic isn&#8217;t a sophisticated attack anymore and is happening more and more often, mainly due to the sad state of router security.</p>
<p>ATTACK REQUIRES NO USER INTERACTION</p>
<p>Furthermore, the attack requires no user interaction except tricking users on accessing a malicious page, and the malicious JavaScript code that drives the attack can also be hidden inside ads (iframes) on legitimate sites, if ever necessary.</p>
<p>As Demirkapi explained to ZDNet, the iframe will point to a subdomain of dell.com, and then a DNS spoofing attack performed from an attacker-controlled machine/router will return an incorrect IP address for the dell.com domain, allowing the attacker to control what files are sent and executed by the SupportAssist tool.</p>
<p>The good news is that Dell took the researcher&#8217;s report seriously and has worked for the past months to patch CVE-2019-3719, a task that concluded last week with the release of SupportAssist v3.2.0.90, which Dell users are now advised to install.</p>
<p>Proof of concept to reproduce an attack is available on GitHub, and Demirkapi also published a demo video showing how easily an attack can lead to a full device compromise. Demirkapi&#8217;s vulnerability report, for additional technical details, is available on the young researcher&#8217;s blog.</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2019/05/vulnerability-exposes-dell-laptops-pcs-to-remote-hijacks/">Vulnerability Exposes Dell Laptops, Pcs to Remote Hijacks</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://irannewsdaily.com/2019/05/vulnerability-exposes-dell-laptops-pcs-to-remote-hijacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Is Selling Excellent Dell XPS 13, Inspiron 15 for Hundreds off</title>
		<link>https://irannewsdaily.com/2017/12/microsoft-selling-excellent-dell-xps-13-inspiron-15-hundreds-off/</link>
					<comments>https://irannewsdaily.com/2017/12/microsoft-selling-excellent-dell-xps-13-inspiron-15-hundreds-off/#respond</comments>
		
		<dc:creator><![CDATA[reporter 1222]]></dc:creator>
		<pubDate>Mon, 11 Dec 2017 07:38:43 +0000</pubDate>
				<category><![CDATA[technology]]></category>
		<category><![CDATA[Dell]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">https://irannewsdaily.com/?p=17156</guid>

					<description><![CDATA[<p>Microsoft&#8217;s 12 Days of Deals features dozens of deals on Dell PCs, but here&#8217;s two we really like &#8212; including our best budget gaming laptop for $200 off. Microsoft’s 12 Days of Deals continues on today with a number of discounts across various Dell laptops and desktops. Two caught our eye: the highly-reviewed Dell XPS 13 [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2017/12/microsoft-selling-excellent-dell-xps-13-inspiron-15-hundreds-off/">Microsoft Is Selling Excellent Dell XPS 13, Inspiron 15 for Hundreds off</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="ntDesc">Microsoft&#8217;s 12 Days of Deals features dozens of deals on Dell PCs, but here&#8217;s two we really like &#8212; including our best budget gaming laptop for $200 off.</div>
<div class="ntText">
<p class="rtejustify">Microsoft’s 12 Days of Deals continues on today with a number of discounts across various Dell laptops and desktops. Two caught our eye: the highly-reviewed Dell XPS 13 9360 ultrabook on sale for $999, and the best budget gaming laptop, the Dell Inspiron 15, on sale for $599.</p>
<p class="rtejustify"><strong>Dell XPS 9360: why it’s a good deal</strong></p>
<p class="rtejustify">Here’s why we like the $999 Dell XPS 13 9360 deal. For one thing, Dell’s XPS 13 ultrabooks consistently perform at or near the top of our tests: we rated the 2017 Dell XPS 13 4.5 out of 5 stars, and the 2016 Dell XPS 13equally highly. The latest update has a Intel 8th-generation Core chip inside, helping boost performance and battery life.</p>
<p class="rtejustify">Here’s the catch, though: the vast majority of the Dell XPS 13s you’ll find online contain a Core i7 chip, the most powerful of Intel’s lineup. That’s perfectly fine, but what if the MSRP of $1,299 is too rich for your blood? That’s where the $999 Dell XPS 13 9360 deal helps out. You’ll save $200 off of the Core i7 price and still get a solid Core i5 ultrabook for the price.</p>
<p class="rtejustify">Granted, the deal’s not absolutely perfect. With 8GB of memory, you shouldn’t experience any slowdowns browsing or running apps on the Dell XPS 13 9360. But with just a 128GB of storage, things may get a little cramped unless you have an external hard drive.</p>
<p class="rtejustify">Don’t worry, though—there’s an alternative. Remember how highly reviewed the Dell XPS 13 was for both the 2017 generation as well as the 2016 model? Sure, we’d always advise buying a machine with the latest components. But if you’d like a Dell XPS 13, consider browsing the available Dell XPS 13 models on Amazon or elsewhere. (You can bump up the SSD size to 256GB with this XPS9360 model, and get a better screen, to boot, for just over $1,000.)</p>
<p class="rtejustify">Just know what you’re shopping for: if you see a laptop with a processor model number that begins with a “6,” that’s a sixth-generation Core chip—possibly a bit out of date for a good gift. Look for a 7th-generation (or 8th-generation) Core chip instead.</p>
<p class="rtejustify"><strong>Dell Inspiron 15 i5577: why it’s a good deal</strong></p>
<p class="rtejustify">Dell offered a deal on the Inspiron 15 earlier this year, pricing it at $800. For that price, you got a 15.6-inch display, 8GB of RAM, and discrete Nvidia GeForce GTX 1050 graphics. Now, Microsoft is selling that same configuration (or close to it) for just $599.</p>
<p class="rtejustify">So what, you may say. Well, not only did we rank the nearly identical Dell Inspiron 15 7000 4 out of 5 stars, but PCWorld consistently ranks it at as our best budget gaming laptop. This looks like a pretty solid deal.</p>
<p class="rtejustify">About the only small hitch that we can find is that Microsoft doesn’t list the actual panel type. One of the complaints we had was early models used a poor 1080p TN panel. Dell’s since rectified that fact by essentially making a much nicer IPS panel standard, but this could be Dell clearing out some of its inventory for the holidays. You can always just use an external monitor, though.</p>
<p class="rtejustify">Microsoft and Dell have a ton of additional deals on Microsoft’s site, from Dell XPS 8910 Signature Edition desktops to Alienware laptops, and more. While you may find other deal to whet your buying appetite, we think both the XPS 13 and the Inspiron 15 are good deals, albeit for slightly different reasons.</p>
</div>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2017/12/microsoft-selling-excellent-dell-xps-13-inspiron-15-hundreds-off/">Microsoft Is Selling Excellent Dell XPS 13, Inspiron 15 for Hundreds off</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://irannewsdaily.com/2017/12/microsoft-selling-excellent-dell-xps-13-inspiron-15-hundreds-off/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
