Uncategorized

MicrosoftSecurity

Overview of rapid cyberattacks

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 23 Jan 2018 17:00:13 +0000

Rapid cyberattacks like Petya and WannaCrypt have reset our expectations on the speed and scope of damage that a cyberattack can inflict. The Microsoft Enterprise Cybersecurity Group Detection and Response team worked extensively to help customers respond to and recover from these kinds of attacks. In 2017, among the global enterprise customers that we worked

Read more

Read More
QuickHealSecurity

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

Credit to Author: Bajrang Mane| Date: Thu, 18 Jan 2018 09:53:22 +0000

Cryptocurrency has become a famous and valuable digital asset. One of the ways to earn cryptocurrencies is to mine them. New coins are generated and brought into the market through the process of mining. Mining of cryptocurrency is a resource-intensive task but mining them on mobile devices is still a…

Read More
MicrosoftSecurity

Microsoft offers several mechanisms to protect against ransomware

Credit to Author: Microsoft Secure Blog Staff| Date: Mon, 15 Jan 2018 17:00:38 +0000

The start of a new year is the perfect time to reassess your security strategy and tactics especially when looking back at the new levels of ransomwares reach and damage in 2017. Its no secret that ransomware attacks are increasing. In fact, a business is hit with ransomware every 40 seconds. If ransomware does

Read more

Read More
MicrosoftSecurity

How to disrupt attacks caused by social engineering

Credit to Author: Microsoft Secure Blog Staff| Date: Wed, 10 Jan 2018 17:00:03 +0000

This post is authored by Milad Aslaner, Senior Program Manager, Windows & Devices Group. A decade ago, most cyber-attacks started with a piece of malware or a complex method to directly attack the infrastructure of a company. But this picture has changed and today all it takes is a sophisticated e-mail phishing for an identity.

Read more

Read More
MicrosoftSecurity

Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems

Credit to Author: Jenny Erie| Date: Tue, 09 Jan 2018 17:00:46 +0000

Last week the technology industry and many of our customers learned of new vulnerabilities in the hardware chips that power phones, PCs and servers. We (and others in the industry) had learned of this vulnerability under nondisclosure agreement several months ago and immediately began developing engineering mitigations and updating our cloud infrastructure. In this blog,

Read more

Read More
MicrosoftSecurity

Application fuzzing in the era of Machine Learning and AI

Credit to Author: Jenny Erie| Date: Wed, 03 Jan 2018 17:00:15 +0000

Proactively testing software for bugs is not new. The earliest examples date back to the 1950s with the term fuzzing. Fuzzing as we now refer to it is the injection of random inputs and commands into applications. It made its debut quite literally on a dark and stormy night in 1988. Since then, application fuzzing

Read more

Read More
MicrosoftSecurity

How Microsoft tools and partners support GDPR compliance

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 19 Dec 2017 17:00:47 +0000

This post is authored by Daniel Grabski,Executive Security Advisor, Microsoft Enterprise Cybersecurity Group. As an Executive Security Advisor for enterprises in Europe and the Middle East, I regularly engage with Chief Information Security Officers (CISOs), Chief Information Officers (CIOs) and Data Protection Officers (DPOs) to discuss their thoughts and concerns regarding the General Data Protection

Read more

Read More
MicrosoftSecurity

How public-private partnerships can combat cyber adversaries

Credit to Author: Jenny Erie| Date: Wed, 13 Dec 2017 17:00:46 +0000

For several years now, policymakers and practitioners from governments, CERTs, and the security industry have been speaking about the importance of public-private partnerships as an essential part of combating cyber threats. It is impossible to attend a security conference without a keynote presenter talking about it. In fact, these conferences increasingly include sessions or entire

Read more

Read More