- Web proxy app becomes Bitcoin mining trojan
- Week in review: Great Bitcoin Robbery highlights shopping-season security risks
- Bitcointalk.org warns passwords in danger after DNS attack
- Fake-police ransomware reaches Australia
Microsoft in pictures
Microsoft today pushed back once again against the idea that it's giving the National Security Agency (NSA) carte blanche access to its cloud-based services, an allegation that's cropped up in media reports since the revelations from former NSA contractor Edward Snowden began last June.
A new zero day flaw in Windows XP and Server 2003 is being exploited in the wild to bypass the sandbox on unpatched versions of Adobe Reader, security firm FireEye has reported.
Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.
Microsoft upped the ante this week in its long-running Scroogled campaign as it started to sell merchandise, including mugs, hats and t-shirts, that took new digs at its rival Google.
While Microsoft's busy selling t-shirts and mugs about how Google's "Scroogling" you, the search giant's chairman is busy tackling a much bigger problem: How to keep your information secure in a world full of prying eyes and governments willing to drag in data by the bucket load. And according to Google's Eric Schmidt, the answer is fairly straightforward.
Anyone who's paid attention to computer security over the past few years will probably tell you that your password isn't enough. Passwords are often awkward and hard to remember--leading people to use the same password for multiple sites--and if someone gets a hold of your login credentials, they can wreak havoc with your personal information. Not good.
Don doesn't need to keep other people off his PC. He asked me how he could skip the logon screen and boot directly into Windows without a password.
The Internet? Kind of a cesspool. And as the parent of kids who are now old enough to operate a Web browser, you can bet I'm keen on checking their activities and filtering out the inappropriate content.
Love it or hate it, Windows 8 is the bellwether for PCs. Where Microsoft goes, PCs follow. And now Microsoft is making a grab for the mobile market, too. The latest version of Windows is designed with touchscreens in mind, and one bright side of that evolution is the addition of features that make Windows more intuitive and easier to use on all devices.
Don't let the Windows 8 haters brainswash you: Microsoft actually introduced a few great features in its new operating system, some of which will help keep you safer from malware and other security threats. Though most of these security enhancements are active by default, you still must be proactive to get the most from them. Also, one new Windows 8 feature presents specific security concerns that must be addressed to keep your PC--and your data--as safe as possible. Let's jump in and investigate.
BlackBerry's fall means CIOs must quickly develop a new mobile strategy. The big three of enterprise mobility are familiar names -- Apple, Samsung and Microsoft. Who will win out?
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
Just because Microsoft doesn't plan on giving Windows XP patches to the public after April 8, 2014, doesn't mean it's going to stop making those patches.
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
Microsoft last week released the Microsoft Security Intelligence Report volume 14 (SIRv14), an biannual report includes data from the second half of 2012 and contains threat intelligence from over a billion computers worldwide.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.