Plus: OpenVPN keys are also at risk of theft due to bug; first Heartbleed-connected arrest made.
Microsoft reportedly has lowered the ceiling price for its Windows XP "custom support."
So far, it's been quiet out there. But don't take the lack of news as an indication that the attackers have moved on.
While Web sites scramble to patch the vulnerability, it's time to change your online passwords.
Microsoft's April Security Update features only two "critical" bulletins.
Microsoft released updates today to Windows 8.1 and Windows Server 2012 R2, which would be unsurprising except for some strong language coming from Microsoft, warning of installation deadlines.
As Microsoft pulls the plug on Windows XP and ends support for the 2003 versions of Office and Exchange, IT faces difficult choices and a variety of options.
- By Jeffrey Schwartz
Microsoft System Center 2012 R2 Data Protection Manager is now better suited for virtual environments, Linux servers, SQL Server support and provides more consistency.
Microsoft is accelerating the product update process for its Endpoint Protection security solutions.
A series of internal message board posts detail how system admis are being targeted to gain access to the networks they control.
It's recommended that IT disable Rich Text Files from being opened through Microsoft Office.
Microsoft offered some security tips today for individuals and organizations that plan to continue to use Windows XP after April 8.
Avast said that once April 8 rolls around, a quarter of its users will be left vulnerable to higher risk of attack.
Service provider denials that they knew of broad access to customer data by the U.S. National Security Agency appear to have been contradicted by an attorney for that agency.
The HP-sponsored event proved that while today's software is more secure than ever, vulnerabilities will be found once money is on the line.
This month marks the third relatively light patch rollout for Microsoft in a row for 2014.
The device platform also saw a large increase in malware motivated by profit.
Create a comprehensive access policy to files and shares with these Windows permission management tools.
- By Derek Schauland
How to install and configure Active Directory Rights Management Services to lock down your organization's files and shares.
Many of the compromised devices were breached using simple brute force techniques to obtain the routers' passwords.