Uncategorized

MicrosoftSecurity

Take these steps to stay safe from counterfeit software and fraudulent subscriptions

Credit to Author: Microsoft Secure Blog Staff| Date: Mon, 02 Apr 2018 16:00:51 +0000

This post is authored by Matt Lundy, Assistant General Counsel, Microsoft. Software piracy and fraudulent subscriptions are serious, industry-wide problems affecting consumers and organizations around the world. In 2016, 39 percent of all software installed on computers was not properly licensed, according to a survey conducted by BSA and The Software Alliance. And each year,

Read more

Read More
MicrosoftSecurity

Working towards a more diverse future in security

Credit to Author: Jenny Erie| Date: Wed, 28 Mar 2018 16:00:31 +0000

Last year I embarked on an exercise to examine diversity in cybersecurity. As one full year has passed, I decided to revisit this topic and the ongoing challenges of recruiting AND retaining diverse talent in the cybersecurity field. This past year saw the #MeToo movement in the spotlight, and while womens issues were brought to

Read more

Read More
MicrosoftSecurity

Filling the gaps in international law is essential to making cyberspace a safer place

Credit to Author: Jenny Erie| Date: Tue, 27 Mar 2018 16:00:31 +0000

A month ago, on the sidelines of the Munich Security Conference, Microsoft organized an expert workshop to discuss gaps in international law as it applies to cyberspace. We were fortunate enough to bring together twenty leading stakeholders, including international legal experts, United Nations Group of Governmental Experts on Developments in the Field of Information and

Read more

Read More
MicrosoftSecurity

Accelerate your security deployment with FastTrack for Microsoft 365

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 20 Mar 2018 16:00:00 +0000

This blog is part of a series that responds to common questions we receive from customers about Microsoft 365 Security and Enterprise Mobility + Security. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. Inpart one of this series, we outlined Tips for getting started on your

Read more

Read More
QuickHealSecurity

An analysis of the Zenis ransomware by Quick Heal Security Labs

Credit to Author: Shriram Munde| Date: Mon, 19 Mar 2018 12:56:40 +0000

Quick Heal Security Labs has come across a new ransomware that goes by the name ‘Zenis’. The ransomware not only encrypts files but also intentionally deletes the infected system’s backup.   The behavior of Zenis ransomware Upon inside a computer, the ransomware performs the following checks before it starts encrypting…

Read More
MicrosoftSecurity

Microsoft Security Intelligence Report volume 23 is now available

Credit to Author: Microsoft Secure Blog Staff| Date: Thu, 15 Mar 2018 13:00:02 +0000

As security incidents and events keep making headlines, Microsoft is committed to helping our customers and the rest of the security community to make sense of the risks and offer recommendations. Old and new malware continues to get propagated through massive botnets, attackers are increasing focus on easier attack methods such as phishing, and ransomware

Read more

Read More
QuickHealSecurity

Email campaign using .url extensions to abuse Internet Explorer vulnerabilities (CVE-2016-3353)

Credit to Author: Prashil Moon| Date: Wed, 14 Mar 2018 08:58:25 +0000

In the wild, malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns using MS Office files with malicious macro and using vulnerabilities. Recently, we observed a spam campaign that uses .url files as a first-stage downloader to spread malware and bypass security features….

Read More
MicrosoftSecurity

How Office 365 protects your organization from modern phishing campaigns

Credit to Author: Microsoft Secure Blog Staff| Date: Wed, 07 Mar 2018 17:00:46 +0000

This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. We often allude to the benefits of having an integrated threat protection stack in Office 365. Today we wanted to take the opportunity to walk you through how the combined features and services in the Office 365 threat management stack help

Read more

Read More