Please turn on your JavaScript for this page to function normally.
Pwn2Own 2014: $150,000 for an “exploit unicorn”

There are a few new rules for this years’ edition of the Pwn2Own hacking contest and a huge new prize for an “Exploit Unicorn worthy of myth and legend” …

Who should be responsible for protecting your online privacy?

Just in time for Data Privacy Day, Microsoft has released the results of a survey that shows the privacy attitudes of technology savvy individuals in the US and four European …

Microsoft reveals law enforcement documents were stolen in latest hack

With a short blog post, Microsoft has announced on Friday that unknown hackers might have accessed and exfiltrated information regarding law enforcement information requests …

Developing countries are more willing to trade privacy for security

Microsoft has released the results of a global survey that tried to answer the question how people around the world see technology and how personal technology has changed …

Microsoft extends support for Win XP’s security solutions to mid-2015

Despite having announced earlier this month that they would stop providing signature updates for Security Essentials for Windows XP in April 8, 2014 – the same date when …

Light Patch Tuesday delivers four bulletins

With only four bulletins, this month’s release is the lightest in recent memory. Markedly missing are any bulletins for Internet Explorer and not a single bulletin is …

Sefnit Trojan endangers users even after removal

Remember when in late August 2013 the Tor anonymity network was hit with a sudden and massive influx of active clients connecting to it? It was later discovered that the spike …

Light Patch Tuesday coming up

2014 is getting off to a light start with Microsoft. Only four advisories in the January advance notification. For the first time in a while, there is not a cumulative IE roll …

Microsoft releases BYOD best practices for enterprise workers

Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …

ZeroAccess botnet down for good?

When Microsoft and various law enforcement agencies around the world disrupted the ZeroAccess botnet at the beginning of December, they did not expect to fully eliminate it. …

Resurgence of malware signed with stolen certificates

Since 2009, variants of the Winwebsec rogue AV family have been trying to trick users into believing their computer has been infected and into paying for …

Configuring for security in a world of 0-days

Last month, Microsoft published two separate notices of 0-day vulnerabilities that were being used in the wild to attack Microsoft products. The first flaw is in a code …

Don't miss

Cybersecurity news