You can probably be identified from your anonymized data

Credit to Author: Danny Bradbury| Date: Thu, 25 Jul 2019 11:59:13 +0000

The idea of de-identifying data has been around for a while. However, a study published this week asserts that it’s even easier to re-identify information than we first thought.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/K0vDv3n7Irg” height=”1″ width=”1″ alt=””/>

Read more

5 smart questions that'll smother most Android security scares

Credit to Author: JR Raphael| Date: Thu, 25 Jul 2019 03:00:00 -0700

I haven’t looked at today’s tech news too closely just yet, but I have a sneaking suspicion some evil-sounding virtual gremlin or other is probably on the brink of invading my smartphone, stealing my secrets, and setting me up for a lifetime of dread and despair.

He might even be covertly eating all the salty snacks from my kitchen this very second. ALL THE SALTY SNACKS, DAMN IT!

I don’t have to scan the headlines too closely to know there’s a decent chance of all of this happening — because all of this happens practically every other week here in the Android world. A solid few to several times a month, it seems, some hilariously named and made-to-seem-scary new piece of malware (ViperRat! Desert Scorpion! Ooga-Booga-Meanie-Monster!) is making its way onto our phones and into our lives. Or so we’re told, rather convincingly and repeatedly. (All right, so I may have made Ooga-Booga-Meanie-Monster up just now, but c’mon: It’s probably only a matter of time til we see something using that name.)

To read this article in full, please click here

Read more

How to cost-effectively manage and secure a mobile ecosystem

Credit to Author: Todd VanderArk| Date: Tue, 16 Jul 2019 16:00:44 +0000

In a world of booming mobility, Pradeo Security Mobile Threat Defense and Microsoft are partnering together for a brighter and more secure future.

The post How to cost-effectively manage and secure a mobile ecosystem appeared first on Microsoft Security.

Read more

Preparing your enterprise to eliminate passwords

Credit to Author: Todd VanderArk| Date: Thu, 11 Jul 2019 22:00:16 +0000

If you’re a CIO, a CISO, or any other exec at a company who is thinking about digital security, the user name/password paradigm is more than a hassle, it’s a true security challenge, which keeps many of us up at night. Today, I’m outlining the basic steps necessary to eliminate passwords, with the acknowledgement that we’re still on the journey. I believe we’ve mapped out the right path, but we aren’t finished yet.

The post Preparing your enterprise to eliminate passwords appeared first on Microsoft Security.

Read more

Microsoft Intelligent Security Association welcomes members of the Microsoft Virus Initiative

Credit to Author: Todd VanderArk| Date: Thu, 11 Jul 2019 21:00:51 +0000

Antimalware products play a key role in collaboration to reduce security complexity and deliver better protection to customers.

The post Microsoft Intelligent Security Association welcomes members of the Microsoft Virus Initiative appeared first on Microsoft Security.

Read more

Dismantling a fileless campaign: Microsoft Defender ATP next-gen protection exposes Astaroth attack

Credit to Author: Eric Avena| Date: Mon, 08 Jul 2019 16:00:51 +0000

Advanced technologies in Microsoft Defender ATP next-generation protection exposed and defeated a widespread fileless campaign that completely “lived off the land” throughout a complex attack chain that run the info-stealing backdoor Astaroth directly in memory

The post Dismantling a fileless campaign: Microsoft Defender ATP next-gen protection exposes Astaroth attack appeared first on Microsoft Security.

Read more

Microsoft’s Threat & Vulnerability Management now helps thousands of customers to discover, prioritize, and remediate vulnerabilities in real time

Credit to Author: Eric Avena| Date: Tue, 02 Jul 2019 16:00:13 +0000

Microsoft’s Threat & Vulnerability Management solution is generally available!

The post Microsoft’s Threat & Vulnerability Management now helps thousands of customers to discover, prioritize, and remediate vulnerabilities in real time appeared first on Microsoft Security.

Read more

Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update

Credit to Author: Eric Avena| Date: Mon, 01 Jul 2019 16:25:25 +0000

With the Windows 10 May 2019 Update we delivered several important features for Windows Defender Application Control. Our focus for this release was responding to some longstanding feedback on manageability improvements. We’re excited to introduce new capabilities in Windows Defender Application Control.

The post Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update appeared first on Microsoft Security.

Read more

3 strategies for building an information protection program

Credit to Author: Todd VanderArk| Date: Tue, 25 Jun 2019 16:20:29 +0000

Five years ago, we started on a journey to update and simplify information protection at Microsoft. We’ve learned a lot about data protection and tools and today we’re sharing some of our best practices.

The post 3 strategies for building an information protection program appeared first on Microsoft Security.

Read more