• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: malware

SolarWinds IT Pro Day

This Week in IT: Teams and Apple Silicon, Cloud Leaders, VMware and Cisco Patches

Better Teams performance on Macs, cloud infrastructure market data, critical patches and cyber threats highlight this week's IT news.

August 4, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. Microsoft Teams on Macs with Apple silicon Microsoft will be rolling out […]

Read More

Microsoft Security RSA Conference

Microsoft Launches Defender Experts for Hunting

Microsoft Defender Experts for Hunting, a new service featuring Microsoft security experts designed to go beyond the endpoint.

August 3, 2022 Zachary Comeau Leave a Comment

Microsoft is helping organizations add to their security operations center’s threat hunting capabilities with Microsoft Defender Experts for Hunting, a new service featuring Microsoft security experts designed to go beyond the endpoint. According to Microsoft, experts will hunt for suspicious activity across endpoints, Office 365, cloud app and identities, and hand off that contextual alert […]

Read More

Home Office Cybersecurity security

5 Tech Security Ideas for Creating a Safe Home Office

When working from home, the heightened cybersecurity risks that come with working outside of a secure corporate network must be addressed.

August 2, 2022 Kate Jones Leave a Comment

Working from home can create a great sense of freedom and flexibility, but it comes with its challenges. When working from home, the heightened cybersecurity risks that come with working outside of a secure corporate network must be addressed for optimal protection. Should someone hack into your home office or Wi-Fi network, your computer and […]

Read More

Smishing, FCC

FCC: Scam Text Messages on the Rise

There have been about 8,500 smishing complaints through June 30, 2022, which is on pace to increase for the fourth straight year, FCC says.

August 1, 2022 Zachary Comeau Leave a Comment

The Federal Communications Commission is warning of a substantial rise in smishing and scam text messages targeting consumers, with 2022 on pace to nearly triple what was reported to the commission in 2019. According to the FCC, which tracks complaints about scam calls and texts, there have been about 8,500 such complaints through June 30, […]

Read More

Microsoft 365 domain, cloud.microsoft

With Microsoft Office Macros Blocked by Default, Hackers are Using Other Techniques

New Proofpoint research show how threat actors are adapting to Microsoft blocking Office macros by default by leveraging other file types.

July 29, 2022 Zachary Comeau Leave a Comment

After pausing the rollout of a default macro-blocking feature in Microsoft Office, Microsoft is now officially blocking VBA macros by default in Office applications in a move to make it harder for threat actors to deploy malware and ransomware using Office applications. Microsoft first announced the VBA macro blocking in February 2022, just a few […]

Read More

SolarWinds IT Pro Day

This Week in IT: AWS Security, ISS Threats, Windows 10 Update, Semiconductor Funding

New AWS security features, research on ISS threats, Windows 10 version 22H2 and funding for semiconductors highlight this week's IT news.

July 28, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. New AWS Security Features Amazon this week announced two key new security […]

Read More

MIcrosoft Entra External ID

Microsoft Officially Unveils Protection for Unmanaged IoT Devices

New security features in Defender for IoT extend coverage to all endpoint types, applications, identities and operating systems.

July 11, 2022 Zachary Comeau Leave a Comment

To help enterprises better secure their unmanaged IoT devices connected to IT networks, Microsoft is releasing new capabilities in Defender for IoT that allows Defender for Endpoint customers to extend their extended detection and response coverage to those devices. According to Microsoft, these new security features extend Defender’s coverage to IoT devices such as digital […]

Read More

Microsoft macros

Microsoft Temporarily Rolls Back Default Office VBA Macros Blocking

Citing feedback, Microsoft is temporarily reversing its rollout of a feature that blocks VBA macros in Office apps by default.

July 11, 2022 Zachary Comeau Leave a Comment

Update July 11: In an update to the original blog post announcing the blocking of VBA macros by default, Microsoft said the rollback is temporary while additional changes are made to enhance visibility.  “This is a temporary change, and we are fully committed to making the default change for all users,” Microsoft says in the […]

Read More

McAfee and Telstra Partner to Bring Privacy, Identity and Security Solutions to Customers Across Australia

July 10, 2022 TechDecisions Staff Leave a Comment

The partnership brings added protection to Telstra’s millions of customers and their devices via McAfee’s intuitive and integrated consumer security platform SAN JOSE, Calif.–(BUSINESS WIRE)–Today, McAfee Corp., a global leader in online protection, announced a multi-year partnership with Telstra, Australia’s leading telecommunications and technology company, to deliver comprehensive protection to safeguard the privacy and identity […]

Read More

PowerShell Cybersecurity

How to Secure PowerShell and Use it for Cybersecurity Defense

Cybersecurity agencies say organizations should take several steps to secure PowerShell and keep it from being used in cyberattacks.

July 6, 2022 Zachary Comeau Leave a Comment

PowerShell is an incredibly effective tool that allows IT administrators to automate repetitive tasks and is particularly useful in helping to protect and manage the cybersecurity of Windows operating systems. However, those same capabilities are just as useful for hackers after gaining initial access to a network,  with PowerShell scripts being used to weaken intrusion […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Interim pages omitted …
  • Page 47
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.