Microsoft
Windows 7 Inside Out
Windows 7 Inside Out, Deluxe Edition is updated with 300+ new pages of information for working with Windows 7. This comprehensive reference to Windows 7 packs hundreds of …
IE 9 best option against Web-based malware attacks
Microsoft’s Internet Explorer 9 has proved once again to be the best choice when it comes to catching attacks aimed at making the user download Web-based malware. This …
Microsoft releases 13 security bulletins, fixes 22 vulnerabilities
Today Microsoft released 13 security bulletins, two rated Critical, nine Important and two Moderate. These bulletins address 22 unique vulnerabilities in Internet Explorer, …
Thor’s Microsoft Security Bible
Thor’s Microsoft Security Bible provides a “one-stop-shop” for Microsoft-related security techniques and procedures as applied to the typical deployment of a …
Microsoft offers $250,000 prize for innovative security technology
Microsoft may not believe in bug bounties, but it’s not adverse to paying for knowledge when it comes to ingenious defensive solutions. The company’s Trustworthy …
Microsoft offers $250,000 reward for botnet information
Microsoft decided to extend their efforts to establish the identity of those responsible for controlling the Rustock botnet by issuing a $250,000 reward for new information …
New Hotmail security features against account hijacking
Microsoft has decided to introduce two new security features for its web-based Hotmail service, in the hope that this will make the accounts more difficult to hijack and …
Mitigating software vulnerabilities
Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption …
Microsoft releases new preview of SQL Server “Denali”
Microsoft released the next public CTP of Microsoft SQL Server “Denali” packed with Business Intelligence (BI) improvements and innovations for relational …
Microsoft fixes 22 vulnerabilities
In today’s Patch Tuesday, Microsoft released 4 bulletins addressing vulnerabilities affecting Windows and Office. Amol Sarwate, Vulnerability Labs Manager for Qualys, …
Solution for Popureb rootkit infection
Bootkits are kernel-mode rootkit variants that hide in the computer’s master boot record (MBR) and are notoriously difficult to spot and, sometimes, to eradicate. …
Portable Microsoft endpoint for secure cloud computing
SPYRUS announced Secure Pocket Drive, the first and only licensed device that boots Microsoft’s mobile, flagship operating system, Windows Embedded Standard 7, from an …
Featured news
Resources
Don't miss
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management
- Hottest cybersecurity open-source tools of the month: December 2024