Microsoft computers targeted by hackers

Microsoft has become the latest company to be attacked by computer hackers

Microsoft has become the latest company to be attacked by computer hackers.

Microsoft found that a handful of computers, including Macs, were recently infected by malicious software.

“We have no evidence of customer data being affected and our investigation is ongoing,” said Matt Thomlinson of Trustworthy Computing Security, in a Microsoft blog post.

The blog post also highlighted the importance that other companies must be prepared to deal with similar attacks in the future.

The IT giant joins the likes of Apple and Facebook, which have both experienced security breaches in recent cyber attacks.

Back in January, Facebook admitted to a security breach after employees visited a mobile developer site that was compromised. The website hosted an exploit, which then allowed malware to be installed on these employees' laptops, according to a blog post.

Facebook has claimed that no user data was from this attack, but security experts say this is difficult to guarantee.

Last week, Apple announced its computer systems had been breached by the same attackers that targeted Facebook. However, the company said only a few computers were affected and there was no evidence of data theft.

Microsoft claimed that its recent breach was from “malicious software using techniques similar to those documented by other organisations."

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close