News

Microsoft Acknowledges, Issues Statement on Security Breach

Security breach will have no impact on customers, says Microsoft statement.

Microsoft last week acknowledged a security breach of its corporate network by hackers and has issued a statement on its Web site downplaying the severity of the incident.

Hackers infiltrated the network via a Trojan program called QAZ that slips in through an e-mail message and were able to access Microsoft's networks for 12 days in October. Rumors surfaced that the company's source code may have been stolen or compromised, but according to the Microsoft statement, it had no evidence of hackers gaining "access to the source code for Office or any Windows product." The statement also says that the company believes the incident will have no impact on customers who use Microsoft products.

Microsoft's statement on the incident can be found at http://www.microsoft.com/technet/security/001027.asp. Reports about the security incident are available from numerous sources, including:

Featured

  • Vendors Issue Patches for Linux Container Runtime Flaw Enabling Host Attacks

    This week, the National Institute of Standards and Technology (NIST) described a high-risk security vulnerability (CVE-2019-5736) for organizations using containers that could lead to compromised host systems.

  • Windows 10 Version 1809 Users May Get Visual Studio Crashes

    Microsoft on Friday issued an advisory for Windows 10 version 1809 users about possible Visual Studio crashes.

  • Standardizing the Look of Outlook's Outbound Messages

    Microsoft typically gives users a blank canvas to compose new e-mails in Outlook. In some corporate environments, however, a blank canvas isn't a good thing.

  • Windows 10 'Semiannual Channel Targeted' Goes Away This Spring

    Microsoft plans to slightly alter its Windows servicing lingo and management behavior with its next Windows 10 operating system feature update release, coming this spring.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.