This month marks the third relatively light patch rollout for Microsoft in a row for 2014.
The device platform also saw a large increase in malware motivated by profit.
Create a comprehensive access policy to files and shares with these Windows permission management tools.
- By Derek Schauland
How to install and configure Active Directory Rights Management Services to lock down your organization's files and shares.
Many of the compromised devices were breached using simple brute force techniques to obtain the routers' passwords.
Microsoft announced the availability of EMET 5.0 Technical Preview at this week's RSA Conference.
Microsoft has implemented the S/MIME e-mail security standard across its hosted and server-based Exchange products, the company announced this month.
In wake of last year's revelations of government surveillance, IT can protect files from prying eyes. When it comes to encryption, you're better protected when you hold the keys.
The new release of the company's systems management service gains improved policy control and eased administration.
An Office 365 service that lets IT pros set the conditions for message encryption is now commercially available.
Not all Windows XP operating systems will become security risks after April 8.
Those that have upgraded to the latest version of Microsoft's Web browser (Internet Explorer 11) are not at risk for attack.
Microsoft announced improvements to its Exchange Online Protection service this week.
Microsoft added multifactor authentication support to its Office 365 solutions this week.
Microsoft's monthly patch includes four 'critical' and three 'important' fixes that address a total of 32 vulnerabilities.
Kaspersky Labs, the firm who disclosed the flaw to Adobe, said one of the vulnerabilities is being used to steal user credentials.
Along with the figures, Microsoft slams Obama's NSA surveillance reform plans for not going far enough to ensure transparency.
If Microsoft wants its next OS to be a success, it should look to what made Windows XP so popular.
Communications service providers now have a bit more leeway to disclose information about the secret information disclosure orders they receive.
While malware moving from mobile devices to PCs have become the norm, malware moving in the opposite direction looks to be a new attacker trick.