Microsoft Security – Advanced Threat Analytics (ATA) monitors user behavior

Uncategorized Comments Off on Microsoft Security – Advanced Threat Analytics (ATA) monitors user behavior

Microsoft Advanced Threat Analytics (ATA) is new Azure AD security monitoring tool for cloud based applications, that has been ported for on-premises monitoring. The preview version is now available for evaluation and testing, as shared below  http://blogs.technet.com/b/ad/archive/2015/05/04/microsoft-advanced-threat-analytics-public-preview-release-is-now-available.aspx http://blogs.microsoft.com/blog/2014/11/13/microsoft-acquires-aorato-give-enterprise-customers-better-defense-digital-intruders-hybrid-cloud-world/ We’ve just released the preview of Microsoft Advanced Threat Analytics (ATA). Microsoft ATA is a new on-premises […]

Microsoft Windows – Control Panel tips

Uncategorized Comments Off on Microsoft Windows – Control Panel tips

Tips and techniques for using Control Panel are shared for both Windows 7 and Windows 8 users http://www.pcmag.com/article2/0,2817,2483646,00.asp http://pcsupport.about.com/od/tipstricks/a/control-panel-command-line.htm http://www.wikiwand.com/en/Control_Panel_(Windows) There are probably life-long Windows users who have never accessed the Control Panel—the interface for taking care of all the of the operating system’s settings. With the Control Panel, you can add or remove software/hardware, […]

Microsoft – 2015 BUILD and IGNITE Conferences share future directions

Uncategorized Comments Off on Microsoft – 2015 BUILD and IGNITE Conferences share future directions

The MSDN channel 9 streaming broadcasts were excellent in their coverage of the 2015 Ignite conference.  These conferences were highly educational in sharing upcoming developments for future Microsoft product capabilities http://www.informationweek.com/software/enterprise-applications/windows-10-hololens-office-microsoft-details-its-vision/d/d-id/1320319 Microsoft’s back-to-back conferences, Build and Ignite — which took place over the past two weeks in San Francisco and Chicago, respectively — offered updates […]

Linux Malware – Jellyfish Rootkit

Uncategorized Comments Off on Linux Malware – Jellyfish Rootkit

New Linux malware techniques have emerged as a proof-of-concept rootkit, that allows more stealth-like capabilities to hide in infected systems undetected. http://www.computerworld.com/article/2920343/security/new-linux-rootkit-leverages-gpus-to-hide.html A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden. The rootkit, called Jellyfish, is a […]


© 2021 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in