Where security is key concern, you should enable the Windows Defender Application Guard on your Windows 10 system and safely browse the internet using Microsoft Edge browser.
Where security is key concern, you should enable the Windows Defender Application Guard on your Windows 10 system and safely browse the internet using Microsoft Edge browser.
If you are using Windows 10 October 2018 Update (version 1809), Microsoft Edge now supports password less authentication to sign-in to MSA accounts using WebAuthn and FIDO2 specifications. This makes Microsoft the first company to support password free authentication.
Let's discuss about password-less authentication and how to configure your Microsoft account to sign-in using Windows Hello and/or Security Keys.
Mady Marinescu, from the Windows Defender Engineering team, in an official blog post announced that the Windows Defender Antivirus can now run in a sandbox to provide you extra security layer. With this development, its the first Antivirus solution which can run in a sandbox.
To know more about this capability and to learn how to enable this feature in Windows 10, continue reading this post.
Microsoft started rolling out its 'Folder Protection' feature to OneDrive, which is also known as "Known Folder Move". This feature keeps your system safe and protected by automatically taking backup of important documents from user data folders like Desktop, Documents and Pictures.
If you are a Windows Insider, you might have already received this update in early July. For non-insiders, here's how to enable this protection.
The recent Cambridge Analytica scandal made people realize how much information about themselves they share online. For those of you unfamiliar with the scandal, a company used a Facebook quiz to profile its users, collecting information - mostly limited to what people chose to share on their public profiles but sometimes, the private messages of Facebook users, too. Let's learn three common sense tips to protect your privacy online.
While their sole aim is to trick people into giving personal information or make payments, Phishing, Vishing and Smishing can be done in different ways. Let's discuss these in details.
Starting with the release of
To provide a safer experience to your users, you must install SSL certificate and start serving your site in HTTPS protocol.
In a month of two, after the attack of 'WannaCry', a new Ransomware named 'Petya' started spreading across the world. It's a massive cyber attack that paralyzed firms, airports, banks and government departments that uses unpatched old Windows operating system.
Starting with Ukraine, it already spread many countries like UK, Spain and India. Check this post to know how to take precaution from such attacks.
You might have already heard about 'WannaCry' or 'WannaCrypt' ransomware which affected many outdated Windows system across the globe and demanded BitCoins worth $300 to decrypt the affected files. This was spread via a vulnerability on Windows system.
Though a fix was already given by Microsoft to safeguard the attack, but a tool to decrypt the affected PC has been recently published by security researchers.
In last few days, you might have heard about 'WannaCry' or 'WannaCrypt' ransomware which spread affected many systems across the globe. This was spread like a worm by using the Windows SMB vulnerability, which was patched in March.
You might become a victim, if you are not running Windows 10 and not yet patched your system with all the security updates that Microsoft released.
Windows provides a Wi-Fi security page, from where you can view the connected Wi-Fi connection’s password or network key. By default, the key remains hidden but you can view it anytime. There might be some reason when you want to retrieve or view the password.
Today in this blog post, we will learn how to retrieve it. For this to work, you must connected to that network at least once. Continue reading to know more.
Not every system has the right folder permission set to all user account and hence, sometime we need special access to specific folder during installation or while executing the application. It is not possible to manually set it up by browsing the folder and hence an automation is mandatory.
If you are looking for a way to set the right permission to specific folder(s) using C# code, this post will help you. Continue reading to learn more about it and grab the code.
Sometime we need to provide an encryption mechanism to protect user data in phone and/or sharing the data over internet to a database. Data security should be always maintain by a developer to protect the content of the application that the user enters.
If you are building an app and looking for some way to implement the mechanism, here is a wrapper class for you to do encryption and decryption of a string literal easily.
In the last post “What is Two-Factor Authentication?” we discussed about various factors of authentication system including different examples. We also learnt about Knowledge Factor, Inherence Factor and Possession Factor.
Microsoft recently added a second step authentication mechanism in all their accounts as an extra security layer. This post will guide you to turn ON/OFF this security layer.
Two-factor authentication is a user authentication system where an user needs to provide two different factors to authorize the user’s identity. It is not a new concept and in many places we are knowingly or unknowingly using it for secure access.
There could be multiple factors too and that known as Multi-factor authentication. Today in this post we will learn basics about this type of authentication system.
Today I received this “Security Alert” from Microsoft via email and thought to share this with you. If you are using ASP.Net in your server, read this post to know about it to keep your server in good health from this DoS Attack. Sharing the email as it is in this post.
Microsoft is aware of detailed information that has been published describing a new method to exploit hash tables. Attacks targeting this type of vulnerability are generically known as hash collision attacks. Attacks such as these are not specific to Microsoft technologies and affect other web service software providers. This vulnerability affects all versions of Microsoft .NET Framework and could allow for an unauthenticated denial of service attack on servers that serve ASP.NET pages.