Microsoft
Pwn2Own 2014: $150,000 for an “exploit unicorn”
There are a few new rules for this years’ edition of the Pwn2Own hacking contest and a huge new prize for an “Exploit Unicorn worthy of myth and legend” …
Who should be responsible for protecting your online privacy?
Just in time for Data Privacy Day, Microsoft has released the results of a survey that shows the privacy attitudes of technology savvy individuals in the US and four European …
Microsoft reveals law enforcement documents were stolen in latest hack
With a short blog post, Microsoft has announced on Friday that unknown hackers might have accessed and exfiltrated information regarding law enforcement information requests …
Developing countries are more willing to trade privacy for security
Microsoft has released the results of a global survey that tried to answer the question how people around the world see technology and how personal technology has changed …
Microsoft extends support for Win XP’s security solutions to mid-2015
Despite having announced earlier this month that they would stop providing signature updates for Security Essentials for Windows XP in April 8, 2014 – the same date when …
Light Patch Tuesday delivers four bulletins
With only four bulletins, this month’s release is the lightest in recent memory. Markedly missing are any bulletins for Internet Explorer and not a single bulletin is …
Sefnit Trojan endangers users even after removal
Remember when in late August 2013 the Tor anonymity network was hit with a sudden and massive influx of active clients connecting to it? It was later discovered that the spike …
Light Patch Tuesday coming up
2014 is getting off to a light start with Microsoft. Only four advisories in the January advance notification. For the first time in a while, there is not a cumulative IE roll …
Microsoft releases BYOD best practices for enterprise workers
Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …
ZeroAccess botnet down for good?
When Microsoft and various law enforcement agencies around the world disrupted the ZeroAccess botnet at the beginning of December, they did not expect to fully eliminate it. …
Resurgence of malware signed with stolen certificates
Since 2009, variants of the Winwebsec rogue AV family have been trying to trick users into believing their computer has been infected and into paying for …
Configuring for security in a world of 0-days
Last month, Microsoft published two separate notices of 0-day vulnerabilities that were being used in the wild to attack Microsoft products. The first flaw is in a code …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility