Microsoft (MSFT) Offering Possible 75.44% Return Over the Next 9 Calendar Days

Microsoft's most recent trend suggests a bearish bias. One trading opportunity on Microsoft is a Bear Call Spread using a strike $250.00 short call and a strike $255.00 long call offers a potential 75.44% return on risk over the next 9 calendar days. Maximum profit would be generated if the Bear Call Spread were to expire worthless, which would occur if the stock were below $250.00 by expiration. The full premium credit of $2.15 would be kept by the premium seller. The risk of $2.85 would be incurred if the stock rose above the $255.00 long call strike price.

The 5-day moving average is moving down which suggests that the short-term momentum for Microsoft is bearish and the probability of a decline in share price is higher if the stock starts trending.

The 20-day moving average is moving down which suggests that the medium-term momentum for Microsoft is bearish.

The RSI indicator is at 35.15 level which suggests that the stock is neither overbought nor oversold at this time.

To learn how to execute such a strategy while accounting for risk and reward in the context of smart portfolio management, and see how to trade live with a successful professional trader, view more here


LATEST NEWS for Microsoft

Is Salesforce Stock A Buy? Digital Transformation Powerhouse Struggles Amid Slack Deal
Tue, 11 May 2021 11:00:55 +0000
Rising corporate spending on digital transformation projects has boosted CRM stock while Salesforce’s acquisitions raise issues. Now there's growing competition with Microsoft Dynamics.

The Zacks Analyst Blog Highlights: Google, Adobe, Microsoft and DocuSign
Tue, 11 May 2021 10:41:10 +0000
The Zacks Analyst Blog Highlights: Google, Adobe, Microsoft and DocuSign

Where to buy Xbox Series X: Restock updates and how to pre-order Microsoft’s newest console in the UK
Tue, 11 May 2021 08:24:19 +0000
The elusive console is selling out everywhere. Here’s how to get your hands on the latest Xbox

Hackers Find Easy Prey as U.S. Ignores One Warning After Another
Tue, 11 May 2021 06:00:00 +0000
(Bloomberg) — The ransomware attack that shut down the nation’s biggest fuel pipeline prompted an all-too familiar question in the corridors of power in Washington and boardrooms across the country: Can anyone stop debilitating hacks?The assault on Colonial Pipeline Co. last week was a particular affront. Not only did it disrupt fuel distribution on the East Coast, it followed an effort by the Biden administration to act against cyber crime — especially ransomware, where criminals remotely disable a computer system and demand payment. Colonial was hit on day 37 of a 60-day push by the Department of Homeland Security to confront such attacks.The administration’s campaign is the latest in a long series of cyber strategies offered by presidents and lawmakers from both parties to curb hackers. For years, security experts have offered concrete recommendations for governments, companies and other organizations to follow to ward off cyber-attacks, but they’re often ignored, or punted in favor of more pressing concerns.“There has to be a different way of approaching this if we are going to stop this plague,” said Philip Reiner, chief executive officer of the Institute for Security and Technology. Reiner’s group recently offered 48 actions the Biden administration and the private sector could pursue against ransomware.The Colonial pipeline was idled for the third consecutive day on Monday, as fuel suppliers increasingly worry about the possibility of gasoline and diesel shortages along the U.S. East Coast. The company said Monday it expects the pipeline to be “substantially” back in operations by the end of the week.While President Joe Biden recently imposed sanctions on Russia over the hack of SolarWinds Corp., the threat of retaliation or prosecution from the U.S. holds little deterrence — at least so far. Many criminal hackers reside in countries that ignore them or tacitly approve of their behavior. Actions to punish state-sponsored hacking groups — including sanctions and indictments — have previously done little to counter the assaults.The list of recent cyber-attack targets reflects both the sophistication and brazenness of the hackers. In government, the victims include the Department of Homeland Security, the Illinois Attorney General’s Office, even the Washington, D.C., police department. In the private sector, hackers infiltrated big tech companies like Microsoft Corp., the cyber-security firm FireEye Inc., San Diego-based Scripps Health and even the Houston Rockets of the National Basketball Association.While Homeland Security advises critical infrastructure operators on risk management, private industry is still responsible for securing its own networks. The result is uneven protection: Some companies, including major banks, have invested heavily in cyber-security. But many others have followed a pattern of ignoring or minimizing the need for safeguards, which can be costly and easy to defer.Recent cyber-attacks against Twitter Inc., and SolarWinds, occurred after security employees warned about weaknesses in the companies’ defenses.Preventing a ‘Cyber 9/11’The problem is particularly troubling for companies that operate critical infrastructure. Initiatives to enhance the security of the operational controls used to run the U.S. electrical grid and other energy infrastructure are years behind better-known efforts to shield data centers and corporate systems, experts say.In the federal government, the non-partisan Government Accountability Office alone has issued some 3,300 recommendations since 2010 for agencies to address vulnerabilities, yet at least 750 had not been implemented by the end of last year.“Although the federal government has made selected improvements, it needs to move with a greater sense of urgency commensurate with the rapidly evolving and grave threats to the country,” the GAO warned in March.In 2019, Congress created a special group — called the Cyberspace Solarium Commission — specifically to come up with a better, more comprehensive plan to fight back against major hacks. The commission made 52 legislative recommendations in a report last March; Congress has enacted 25 of them so far; roughly 10 of 30 non-legislative recommendations have been implemented.“The Cyberspace Solarium Commission was envisioned to be ‘the 9/11 commission that averts a cyber-9/11,’” the commission’s co-chairs, Senator Angus King, Independent of Maine, and Representative Mike Gallagher, a Wisconsin Republican, said in a statement after the Colonial breach.“One of the gravest lessons from the terrorist attack 20 years ago was that it was a failure of imagination,” they said. “America can and must be better –- we must be imaginative, and proactive, in navigating the threats of the age of cyber aggression.”Divided CongressIn the aftermath of the Colonial Pipeline attack, Biden and a bitterly divided Congress will be under pressure to mandate greater disclosure of breaches and costly network protections that have been thwarted in the past.“My administration takes this very seriously,” Biden said Monday, as he committed to “a global effort” to combat ransomware attacks, including criminal prosecutions and efforts to disrupt money-laundering operations associated with the hackers.The White House had already moved to strengthen collaboration between U.S. national security agencies and power utilities, with a plan for rolling out better technology to detect hacks of industrial control systems that run the nation’s power systems.The administration is also finalizing an executive order that would set basic cyber-security standards for the federal government, including multifactor authentication of users.There’s widespread consensus that better coordination between the government and private industry is needed to bolster the nation’s cyber defenses. But it isn’t as easy as it seems.A major challenge is simply sharing information. The federal government itself is limited in how much it can tell companies about potential threats, and industry leaders have complained they are too often left in the dark.Despite years of hand wringing about the need for government and companies to better collaborate, “it has yet to really occur,” said Mike McKenna, a former senior White House official with energy and cyber-security clients.Coordination Deficit“The industry tends to be impaired because it does not have real-time access to what the government knows, and government tends to be impaired because, with a very few exceptions, they don’t actually have cyber-security capabilities,” McKenna said.Companies face numerous obstacles to revealing their own breaches — including fears that they will be slapped with shareholder lawsuits if they disclose an attack too soon. But rapidly informing regulators about possible breaches and the digital fingerprints hackers have left behind can be critical to identifying and preventing other intrusions.“There are still potential risks that companies take in sharing the information,” said Suzanne Spaulding, a former Homeland Security official who now is a senior adviser at the Center for Strategic and International Studies.One option for Congress is removing some legal liability, which could encourage companies to swiftly disclose cyber attacks. But if Congress goes too far to shield companies, it could remove pressure for them to harden their defenses, Spaulding said.“It’s a delicate balance,” Spaulding said. “It’s hard, finding that right formula for maintaining the incentive to do the right thing while figuring out how to incentivize them to share the information.”James Lewis, senior vice president at the Center for Strategic and International Studies, said people generally don’t take the risk of a cyber-attack as incentive enough to take action.“We’ve been wrestling with this thing for a decade or so now, and the answer is, market forces alone aren’t going to push people to do the right thing,” he said.“We’ve learned the hard way that there are some basics that make it very hard to get hacked,” Lewis said. “Most people don’t do it.”For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2021 Bloomberg L.P.

Microsoft (MSFT) Dips More Than Broader Markets: What You Should Know
Mon, 10 May 2021 21:45:09 +0000
Microsoft (MSFT) closed at $247.18 in the latest trading session, marking a -2.09% move from the prior day.

Related Posts

 

MarketTamer is not an investment advisor and is not registered with the U.S. Securities and Exchange Commission or the Financial Industry Regulatory Authority. Further, owners, employees, agents or representatives of MarketTamer are not acting as investment advisors and might not be registered with the U.S. Securities and Exchange Commission or the Financial Industry Regulatory.


This company makes no representations or warranties concerning the products, practices or procedures of any company or entity mentioned or recommended in this email, and makes no representations or warranties concerning said company or entity’s compliance with applicable laws and regulations, including, but not limited to, regulations promulgated by the SEC or the CFTC. The sender of this email may receive a portion of the proceeds from the sale of any products or services offered by a company or entity mentioned or recommended in this email. The recipient of this email assumes responsibility for conducting its own due diligence on the aforementioned company or entity and assumes full responsibility, and releases the sender from liability, for any purchase or order made from any company or entity mentioned or recommended in this email.


The content on any of MarketTamer websites, products or communication is for educational purposes only. Nothing in its products, services, or communications shall be construed as a solicitation and/or recommendation to buy or sell a security. Trading stocks, options and other securities involves risk. The risk of loss in trading securities can be substantial. The risk involved with trading stocks, options and other securities is not suitable for all investors. Prior to buying or selling an option, an investor must evaluate his/her own personal financial situation and consider all relevant risk factors. See: Characteristics and Risks of Standardized Options. The www.MarketTamer.com educational training program and software services are provided to improve financial understanding.


The information presented in this site is not intended to be used as the sole basis of any investment decisions, nor should it be construed as advice designed to meet the investment needs of any particular investor. Nothing in our research constitutes legal, accounting or tax advice or individually tailored investment advice. Our research is prepared for general circulation and has been prepared without regard to the individual financial circumstances and objectives of persons who receive or obtain access to it. Our research is based on sources that we believe to be reliable. However, we do not make any representation or warranty, expressed or implied, as to the accuracy of our research, the completeness, or correctness or make any guarantee or other promise as to any results that may be obtained from using our research. To the maximum extent permitted by law, neither we, any of our affiliates, nor any other person, shall have any liability whatsoever to any person for any loss or expense, whether direct, indirect, consequential, incidental or otherwise, arising from or relating in any way to any use of or reliance on our research or the information contained therein. Some discussions contain forward looking statements which are based on current expectations and differences can be expected. All of our research, including the estimates, opinions and information contained therein, reflects our judgment as of the publication or other dissemination date of the research and is subject to change without notice. Further, we expressly disclaim any responsibility to update such research. Investing involves substantial risk. Past performance is not a guarantee of future results, and a loss of original capital may occur. No one receiving or accessing our research should make any investment decision without first consulting his or her own personal financial advisor and conducting his or her own research and due diligence, including carefully reviewing any applicable prospectuses, press releases, reports and other public filings of the issuer of any securities being considered. None of the information presented should be construed as an offer to sell or buy any particular security. As always, use your best judgment when investing.