• 0 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: July 8th, 2023

help-circle



  • This will almost certainly be a false positive, its a heuristics(I think that’s the correct term) based detection, basically just matches certain characteristics of files that have been related to that trojan.

    These days Defender has exceptional real time malware scanning capabilities, it often picks up stuff as you download it or even as it executes. If this was a detection of an existing file, its very likely a false positive.





  • I’m also not a fan of MS spyware.

    But in defence of the MS authenticator, the 2FA prompts it sends are very convenient, how they pop up and ask for the number displayed on screen, its definitely more secure than just the one time code.

    Plus it also shows what phone the user is using when they install and configure the authenticator app, this is also very useful if you suddenly see the user accessing their mail or one drive from another mobile device.




  • The alternative is you could use a Windows server… Bear in mind a lot of code for windows is private and isn’t open to scrutiny from the public so chances are there could possibly be built-in backdoors no one is aware of except for Microsoft or there are backdoors which are only known to a hacker who’s discovered them.

    The recent xz backdoor, I think is a stellar example of how powerful open source software can be, a community came together and noticed this in such a short period of time and had a way to quickly resolve this without this being a large scale issue, looking back at things like Log4j which caused so much pain across the entire industry, we are so lucky to have open source software communities.