Free Live training at Microsoft NYC on Azure

Azure Certification Jump Start – Free Event

70-534 Architecting Microsoft Azure Solutions

Join this training for a full day focused on architecting Microsoft Azure systems and solutions. You’ll also discover what’s required to pass the MCP Azure Certification exam.

We’ll cover all the exam objectives, including PowerShell, through live demos, hands-on labs and discussions, and we will tailor the agenda to fit your needs and concerns. View detailed agenda
Everyone who attends will receive a copy of the Microsoft Press guide, 70-534 Exam Reference: Architecting Microsoft Azure Solutions (co-authored by Dan and a $40 value). The event also includes breakfast, lunch, and drinks during the social hour — all at no cost to you, thanks to our generous sponsors.

image

Dec 7th 2015 – Microsoft –

11 Times Square NYC, NY

Schedule is

8:00 Registration, Breakfast, Networking and say thanks to our sponsors
8:30 Sharp: 70-534 Introduction & Exam Tips and Tricks (Don’t be late!!!!)
9:15 Design Microsoft Azure infrastructure and networking (15–20%)
10:15 Secure resources (15–20%)
11:15 Design websites (15–20%)

12:00 Lunch & Meet Sponsors & Networking

1:00 Labs & Special Tribute (Hands-On-Labs – Bring your laptops & Power)

1:45 Design an application storage and data access strategy (15–20%)
2:45 Design an advanced application (15–20%)
3:45 Design a management, monitoring, and business continuity strategy (15–20%)
– hardest module plan on staying

5:15 Evaluations, Book Signing and Social

Registration at: http://aka.ms/70-534

 

Phone Security

I been seeing issues with phone recently and though I would talk about them… You might forget that a Smartphone today is much more powerful that the pc you use 10 years ago. But how do you protect  them?

I seen over and over again phone with anti-virus or malware protection. You would not do that on PC why not protect your phone.

In the last few week I blogged about Problems with IPhones, and Android devices.. But wait there much more to worry about ….

 

Per Michael Bentley at lookout blog

Lookout has detected over 20,000 samples of this type of trojanized adware masquerading as legitimate top applications, including Candy Crush, Facebook, GoogleNow, NYTimes, Okta, Snapchat, Twitter, WhatsApp, and many others.

Over the past year, Lookout has studied three interconnected families of adware. Lookout discovered the family Shuanet, which, like all of these families, auto-roots the device and hides in the system directory. Kemoge, or what we call ShiftyBug, recently made headlines for rooting the victim’s device and installing secondary payload apps. Another family, Shedun, also referred to as GhostPush, is yet another example of this trojanized adware. While many classify these as simple “adware,” these families are trojans.

Together, the three are responsible for over 20,000 repackaged apps, including Okta’s two-factor authentication app. We are in contact with Okta regarding this malicious repackaging of its app.

The repercussions

For individuals, getting infected with Shedun, Shuanet, and ShiftyBug might mean a trip to the store to buy a new phone. Because these pieces of adware root the device and install themselves as system applications, they become nearly impossible to remove, usually forcing victims to replace their device in order to regain normalcy.

For enterprises, having rooted devices on the network is a concern, especially if those devices were rooted by a repackaged version of a legitimate and popular enterprise app. In this rooted state, an everyday victim won’t have the proper interface to control what apps on the phone request root access. The problem here is that these apps may gain access to data they shouldn’t have access to, given their escalated privileges.

 

With just a quick search for “malware” on this site you can find many stories about this topic. According to internet security firm McAfee, instances of mobile malware have increased by as much as 700 percent since 2011. It’s time to set things straight once and for all. This is the truth about Android malware.

Less you think IPhone are secure, a new Malware app called YiSpecter, the was discovered by security company Palo Alto Networks, the same entity that first detailed the XcodeGhost hack.

YiSpecter can infiltrate any iOS device via a variety of means, posing as a genuine Apple-signed app once installed. Once on your iOS device, the app can then make itself invisible to the user by disguising itself as an actual iOS app, or hiding itself from the home screen – which means the user has no means of deleting it.

“On infected iOS devices, YiSpecter can download, install and launch arbitrary iOS apps, replace existing apps with those it downloads, hijack other apps’ execution to display advertisements, change Safari’s default search engine, bookmarks and opened pages, and upload device information to the C2 [command and control] server,” the researchers revealed.

Even if manually deleted, the malware will automatically re-appear.

Software for a Phone like Lookout for IOS devices or Android will help protect you NOW before you compromise your device

Get and use AV protection for your phone

I like Lookout but there are other vendors that you can choose. but do nothing and it only time till you download something that take over your device

2015 Microsoft Expert Series: The Future of Security in the Cloud

When

Wednesday, November 11, 2015 from 6:00 PM to 8:00 PM (EST)

 

Where

Microsoft Innovation Center – 11 Times Square. 41st St and 8th Ave (please use 8th Ave entrance). New York, NY 10036

In just the past 12 months, the breadth and cost of data breaches have increased significantly.

In the wake of seemingly unrelenting security failures at organizations of all sizes, from Anthem and OPM to Ubiquity and the IRS, CIOs and CISOs are being asked to create and enforce security programs that can effectively protect their data and reputations. In seeking to balance security against productivity, how can organizations remain nimble without compromising their security posture, especially with highly collaborative cloud tools and platforms? What new trends will dominate minds and budgets in the months to come?

Join us for an evening of lively conversation and diverse perspective on the future of security in the cloud, hosted at Microsoft’s exclusive Technology Center at 11 Times Square, New York, NY. Our featured keynote speaker will be Harold Moss, Senior Director of Security Strategy at Akamai.

Please note that registration is required, as no walk-ins will be allowed by building security.

All proceeds will be donated to the Food Bank for NYC, the city’s major hunger-relief organization

To register go here