Get Started with Security Update Guide – new portal for security updates

blog1
blog1

Traditionally, Information about the vulnerabilities and security updates (a.k.a Security Patches) had been published on the Microsoft Security Bulletin website. We have been asked for better access to security update information, as well as easier ways to customize their view to serve a diverse set of needs. Now, Microsoft released a new destination for security…


Microsoft SHA-1 Deprecation Plan – User’s Guide

eng-sha1-3
eng-sha1-3

Today, many in the security community believe SHA-1 hash algorithm is a legacy cryptographic and is no longer secure. An attacker may utilize weaknesses in SHA-1 to perform the man-in-the middle attacks, spoof the content, or perform phishing. As announced in Microsoft Advisory and Microsoft Edge Official Blog, Microsoft, in collaboration with other members of…


Can Microsoft IT be infected by computer viruses? – The answer is YES!

Hello, This is Yurika, security program manager at Customer Services and Support. At Microsoft, there are more than 150,000 employees across more than 100 countries and regions worldwide, and over 600,000 devices are used internally (Microsoft IT). The most advanced software and technology is used in the internal IT environment, and latest security measurements are…