Microsoft

Microsoft - News, Features, and Slideshows

Most popular

Microsoft in pictures

News about Microsoft
Tutorials about Microsoft
  • Three ways to use BitTorrent Sync to share your files without the cloud

    By Ian Paul | 27 August, 2014 03:27

    On Tuesday, BitTorrent (the company) launched Sync 1.4, a brand new version of its peer-to-peer file syncing app that makes sharing folders with others a breeze. We have an in-depth hands-on with Sync 1.4 that will teach you how to use the app if you're not familiar with it.

  • How to create an anonymous email account

    By Ian Paul | 16 July, 2014 03:24

    A reader recently asked me how they could use aliases in Outlook.com to create an anonymous email account. My answer was simple: you really can't.

  • One tweak can make your Windows PC virtually invulnerable

    By Tony Bradley | 19 February, 2014 21:55

    Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto.

  • How to recover files after a malware attack

    By Lincoln Spector | 13 January, 2014 18:25

    Malware infected Jones888's computer, and important files are no longer accessible. How can Jones get them back?

  • Save your Internet bacon with two-factor authentication

    By Nick Mediati | 30 October, 2013 19:00

    Anyone who's paid attention to computer security over the past few years will probably tell you that your password isn't enough. Passwords are often awkward and hard to remember--leading people to use the same password for multiple sites--and if someone gets a hold of your login credentials, they can wreak havoc with your personal information. Not good.

Features about Microsoft
CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

ZENworks® Endpoint Security Management

Get powerful mobile security capabilities, and protect the data the various mobile devices inside your organization.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.