Microsoft's most recent trend suggests a bullish bias. One trading opportunity on Microsoft is a Bull Put Spread using a strike $210.00 short put and a strike $200.00 long put offers a potential 44.93% return on risk over the next 29 calendar days. Maximum profit would be generated if the Bull Put Spread were to expire worthless, which would occur if the stock were above $210.00 by expiration. The full premium credit of $3.10 would be kept by the premium seller. The risk of $6.90 would be incurred if the stock dropped below the $200.00 long put strike price.
The 5-day moving average is moving up which suggests that the short-term momentum for Microsoft is bullish and the probability of a rise in share price is higher if the stock starts trending.
The 20-day moving average is moving up which suggests that the medium-term momentum for Microsoft is bullish.
The RSI indicator is at 38.02 level which suggests that the stock is neither overbought nor oversold at this time.
To learn how to execute such a strategy while accounting for risk and reward in the context of smart portfolio management, and see how to trade live with a successful professional trader, view more here
LATEST NEWS for Microsoft
General Motors’ Stock Up 10%, and Two More Numbers to Know
Wed, 20 Jan 2021 10:00:00 +0000
A new partnership on driverless vehicles has GM’s stock on the rise. Royal Caribbean cuts costs. Plus, New York state’s proposed new income tax.
Trump Signs Order to Restrict Foreign Use of Cloud Companies
Wed, 20 Jan 2021 06:51:34 +0000
(Bloomberg) — On his last full day in office, President Donald Trump signed an executive order the White House said was aimed at preventing foreign malicious cyber-actors from using U.S. online infrastructure to carry out their activities.The order, which provides the Commerce Department with the authority to impose record-keeping obligations on foreign transactions, is viewed as a response to the recent hacking campaign that infected software from SolarWinds Corp. and targeted organizations including government agencies.“Foreign malicious cyber-actors threaten our economy and national security through the theft of intellectual property and sensitive data, and by targeting United States critical infrastructure,” National Security Advisor Robert O’Brien said in a statement. He said abuse of American infrastructure service products — such as those offered by cloud outfits like Amazon Web Services and Microsoft Azure — had “played a role in every cyber incident during the last four years, including the actions resulting in the penetrations of United States firms FireEye and Solar Winds.”It was a “much-needed step, unfortunately it takes a significant and public compromise like the SolarWinds breach into U.S. government infrastructure to drive change like this,” said Jon DiMaggio, chief security strategist at Analyst1, a cyber-threat analysis firm in Reston, Virginia.“It certainly isn’t the first time supply chain attacks have happened, nor is it the first time the U.S. government has been aware of the problem. It’s about time we started looking past the vendor cost to determine what technology we allow to support critical government infrastructure,” he said.The order allows the Commerce Department to block American infrastructure firms from operating in countries where those products are used for malicious cyber-activity, either by individuals or if the country’s own government is a source of that activity.The order also grants powers to ban or impose conditions on foreigners opening or maintaining accounts with American firms within the U.S. if they are found to be involved in malicious cyber-activity.The Commerce Department is tasked with proposing regulations within six months of the order being issued, but it isn’t clear that the incoming administration led by Joe Biden will implement it.“I could see them adding a comment period or something from the impacted companies,” said Alex Stamos, a Stanford University professor helping SolarWinds’ recovery efforts after its breach, who had served as chief security officer at Facebook until 2018. Biden “might just wholesale wipe out every executive order too.”Read more: SolarWinds Hack Followed Years of Warnings of Weak CybersecurityIn December, Austin, Texas-based SolarWinds found itself at the center of the largest cyber-security attack in recent memory. Suspected Russian hackers breached the internal networks of at least 200 customers, including U.S. government agencies and an as-yet-unknown number of private companies, a cyber-security firm and people familiar with the investigation told Bloomberg News.In an operation that cyber-security experts have described as exceedingly sophisticated and hard to detect, the hackers installed malicious code in updates to SolarWinds’ widely used Orion software, which was sent to as many as 18,000 customers.For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2021 Bloomberg L.P.
Suspected Russian Hackers Targeted Cyber Firm Malwarebytes
Wed, 20 Jan 2021 01:10:59 +0000
(Bloomberg) — Suspected Russian hackers targeted the cybersecurity company Malwarebytes Inc. in the course of a sprawling cyber-attack that breached U.S. government agencies and companies.The attacker abused “applications with privileged access to Microsoft Office 365 and Azure environments,” according to a Tuesday blog post by Chief Executive Officer Marcin Kleczynski. He said the attack was part of the same hacking campaign that has utilized infected software from SolarWinds Corp. to target other organizations.“After an extensive investigation, we determined the attacker only gained access to a limited subset of internal company emails. We found no evidence of unauthorized access or compromise in any of our internal on-premises and production environments,” Kleczynski wrote.U.S. intelligence agencies and the FBI have said the recent hacking campaign — which was found and disclosed by the cybersecurity firm FireEye Inc. in December — was likely undertaken by Russia. In many instances, attackers broke into systems through a compromised version of widely used software from Texas-based SolarWinds Corp.However, analysts have said that SolarWinds’s software wasn’t the only method the suspected Russian hackers used to breach networks. On Tuesday, the firm Symantec discovered a new form of malware used in the attack that wasn’t delivered through SolarWinds, suggesting the hack could be broader than previously understood. The firm CrowdStrike Inc. said the hackers had attempted to break into their networks by compromising a third-party vendor that resells Microsoft services. If a reseller is breached and has access to a client’s credentials, the attacker could then hack into the client’s networks.On Dec. 15, Microsoft alerted Malwarebytes about “suspicious activity from a third-party application” that was consistent with the behaviors of the hackers that had exploited SolarWinds. Upon investigation, Malwarebytes found “no evidence of unauthorized access or compromise in any of our internal on-premises and production environments,” he wrote.Jeff Jones, a Microsoft representative, said in a statement, “Our ongoing investigation of recent attacks has found this advanced and sophisticated threat actor had several techniques in their toolkit. We have not identified any vulnerabilities in our products or cloud services.”Malwarebytes’s disclosure is the latest example of the attackers targeting security companies in the course of the hacking campaign. They stole tools from FireEye and attempted to breach CrowdStrike, the companies said last month.“These attackers were clearly sophisticated and primarily targeted federal agencies and security companies, as far as I’m aware,” Kleczynski said in an email to Bloomberg News.FireEye’s investigation into its own breach last month revealed that the hackers had installed malicious code into SolarWinds’s Orion software, which is used by government agencies and Fortune 500 companies. The malicious code, which customers received by updating the software, provided a launching pad of sorts for further attacks by the hackers into computer networks.According to SolarWinds, as many as 18,000 of its customers may have received infected updates, though the hackers are believed to have conducted further intrusions in far fewer of them. Malwarebytes isn’t a SolarWinds customer.(Updates with Microsoft statement in seventh paragraph.)For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2021 Bloomberg L.P.
GameStop Stock Is Soaring. It Could End Badly.
Tue, 19 Jan 2021 23:46:00 +0000
The stock closed up 11% despite a deteriorating business outlook as gamers shift to free-to-play games and digital downloads. Things could get ugly.
Daily Crunch: Microsoft backs Cruise
Tue, 19 Jan 2021 23:12:20 +0000
Autonomous vehicle company Cruise raises a $2 billion new round, Netflix keeps growing and WhatsApp faces more privacy concerns. Cruise announced today that it has raised $2 billion in new funding at a $30 billion valuation, with Microsoft joining as a new investor.
Also on Market Tamer…
Follow Us on Facebook