Select Page
wannacrypt1

WannaCrypt ransomware worm targets out-of-date systems

On May 12, 2017 we detected a new ransomware that spreads like a worm by leveraging vulnerabilities that have been previously fixed. While security updates are automatically applied in most computers, some users and enterprises may delay deployment of patches ... continue reading
(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading
java-malware-sample-email

Combating a spate of Java malware with machine learning in real-time

In recent weeks, we have seen a surge in emails carrying fresh malicious Java (.jar) malware that use new techniques to evade antivirus protection. But with our research team’s automated expert systems and machine learning models, Windows 10 PCs get ... continue reading
tech-support-scam-countries

Tech support scams persist with increasingly crafty techniques

(Note: Our Tech support scams FAQ page has the latest info on this type of threat, including scammer tactics, fake error messages, and the latest scammer hotlines.) Millions of users continue to encounter technical support scams. Data from Windows Defender ... continue reading
nsis-old-vs-new

Ransomware operators are hiding malware deeper in installer packages

We are seeing a wave of new NSIS installers used in ransomware campaigns. These new installers pack significant updates, indicating a collective move by attackers to once again dodge AV detection by changing the way they package malicious code. These ... continue reading
The Fourth User Interface: How Virtual, Augmented & Mixed Reality will Change your World

The Fourth User Interface: How Virtual, Augmented & Mixed Reality will Change your World

Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity. Join Lex Thomas as he welcomes Jeremy Rule to the show, as they ... continue reading
Ransomware encounters on enterprise endpoints

Averting ransomware epidemics in corporate networks with Windows Defender ATP

Microsoft security researchers continue to observe ransomware campaigns blanketing the market and indiscriminately hitting potential targets. Unsurprisingly, these campaigns also continue to use email and the web as primary delivery mechanisms. Also, it appears that most corporate victims are simply ... continue reading
Email message masquerading as a fax but carrying TrojanDownloader:JS/Crimace.A as attachment

Fake fax ushers in revival of a ransomware family

"Criminal case against you" is a message that may understandably cause panic. That’s what a recent spam campaign hopes happens, increasing the likelihood of recipients opening the malicious attachment. We recently discovered a new threat that uses email messages pretending ... continue reading

No payment necessary: Fighting back against ransomware

Any IT professional who’s ever had an experience with malware knows how fast an intrusive attack can happen, and how difficult it can be to educate employees to be vigilant against such threats. And with ransomware attacks only growing, having ... continue reading
thCA1QREO3

How to Simplify Device & Apps Management using Microsoft Intune

Microsoft Intune provides mobile device management, mobile application management and PC management capabilities from the cloud. Join Lex Thomas as he welcomes Ilya Beynenson to the show as they discuss the many benefits Intune can bring to an IT organization’s ... continue reading