Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft Windows security
How is Windows BITS used to redownload malware after its removal?
Malicious Windows BITS tasks set up by attackers can reinfect systems even after the malware has been removed. Expert Nick Lewis explains how to locate and remove these tasks. Continue Reading
How can APT groups be stopped from exploiting a Microsoft Office flaw?
APT groups have been continuously exploiting a flaw in Microsoft Office, despite it having been patched. Expert Nick Lewis explains how these attacks work and how to prevent them. Continue Reading
How is Windows hot patching exploited by APT groups?
The hot-patching feature in Windows servers is vulnerable to attacks from APT groups. Expert Nick Lewis explains what hot patching is and how to mitigate its flaw. Continue Reading
-
Why did QuickTime for Windows move to end of life so abruptly?
QuickTime for Windows was found to have two zero-day vulnerabilities, and was then suddenly moved to end of life by Apple. Expert Michael Cobb explains the abrupt action. Continue Reading
How can USB Thief be stopped from infecting air-gapped systems?
USB Thief, a new type of stealth malware, leaves no trace on air-gapped targets. Expert Nick Lewis explains how the malware works and how enterprises can mitigate attacks. Continue Reading
How has Windows Defender Advanced Threat Protection improved?
Microsoft has released a new version of Windows Defender Advanced Threat Protection. Expert Nick Lewis explains the new features of this antimalware tool.Continue Reading
How does the banking Trojan Dyreza exploit Windows 10?
A variant of banking Trojan Dyreza has begun to target Windows 10. Expert Nick Lewis explains the new attack functionalities, and Windows 10 and user vulnerabilities.Continue Reading
How can embedded documents be used to attack enterprises?
A flaw in Microsoft allows attackers in through executable embedded documents. Expert Nick Lewis explains the vulnerability and how enterprises can stop it.Continue Reading
Microsoft Device Guard tackles Windows 10 malware
A new Microsoft security feature takes aim at Windows 10 malware. Expert Michael Cobb explains what enterprises should know about Device Guard.Continue Reading
Windows 10 privacy settings: Concerns versus reality
New Windows 10 privacy settings require balancing the benefits of new features against the risk of revealing too much personal information online. Expert Michael Cobb explains.Continue Reading
-
After Windows Server 2003 end of life: An emergency action plan
Microsoft is ending support for Windows Server 2003 in July 2015, yet many organizations will still run W2K3 beyond this date. Learn how to keep your enterprise safe.Continue Reading
What are the Windows Phone 8.1 security improvements?
Microsoft hardened its Windows 8.1 update to make it enterprise- and government-worthy. Expert Michael Cobb outlines the new and improved features.Continue Reading
A first look at Windows 10 security features
In a preview of Windows 10 security features, expert Michael Cobb discusses three improvements that will boost enterprise security.Continue Reading
Does Windows 8.1 meet the demands of the BYOD age?
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features and tools; Windows 8.1 is Microsoft's response. Windows 8.1 includes what is promised to be a less ...Continue Reading
Microsoft EMET 5.0: New features and functionality
With the release of Microsoft EMET 5.0 come new features and functionality. Michael Cobb explains what's new in the technical preview.Continue Reading