Microsoft (MSFT) Offering Possible 44.93% Return Over the Next 29 Calendar Days

Microsoft's most recent trend suggests a bullish bias. One trading opportunity on Microsoft is a Bull Put Spread using a strike $210.00 short put and a strike $200.00 long put offers a potential 44.93% return on risk over the next 29 calendar days. Maximum profit would be generated if the Bull Put Spread were to expire worthless, which would occur if the stock were above $210.00 by expiration. The full premium credit of $3.10 would be kept by the premium seller. The risk of $6.90 would be incurred if the stock dropped below the $200.00 long put strike price.

The 5-day moving average is moving up which suggests that the short-term momentum for Microsoft is bullish and the probability of a rise in share price is higher if the stock starts trending.

The 20-day moving average is moving up which suggests that the medium-term momentum for Microsoft is bullish.

The RSI indicator is at 38.02 level which suggests that the stock is neither overbought nor oversold at this time.

To learn how to execute such a strategy while accounting for risk and reward in the context of smart portfolio management, and see how to trade live with a successful professional trader, view more here


LATEST NEWS for Microsoft

General Motors’ Stock Up 10%, and Two More Numbers to Know
Wed, 20 Jan 2021 10:00:00 +0000
A new partnership on driverless vehicles has GM’s stock on the rise. Royal Caribbean cuts costs. Plus, New York state’s proposed new income tax.

Trump Signs Order to Restrict Foreign Use of Cloud Companies
Wed, 20 Jan 2021 06:51:34 +0000
(Bloomberg) — On his last full day in office, President Donald Trump signed an executive order the White House said was aimed at preventing foreign malicious cyber-actors from using U.S. online infrastructure to carry out their activities.The order, which provides the Commerce Department with the authority to impose record-keeping obligations on foreign transactions, is viewed as a response to the recent hacking campaign that infected software from SolarWinds Corp. and targeted organizations including government agencies.“Foreign malicious cyber-actors threaten our economy and national security through the theft of intellectual property and sensitive data, and by targeting United States critical infrastructure,” National Security Advisor Robert O’Brien said in a statement. He said abuse of American infrastructure service products — such as those offered by cloud outfits like Amazon Web Services and Microsoft Azure — had “played a role in every cyber incident during the last four years, including the actions resulting in the penetrations of United States firms FireEye and Solar Winds.”It was a “much-needed step, unfortunately it takes a significant and public compromise like the SolarWinds breach into U.S. government infrastructure to drive change like this,” said Jon DiMaggio, chief security strategist at Analyst1, a cyber-threat analysis firm in Reston, Virginia.“It certainly isn’t the first time supply chain attacks have happened, nor is it the first time the U.S. government has been aware of the problem. It’s about time we started looking past the vendor cost to determine what technology we allow to support critical government infrastructure,” he said.The order allows the Commerce Department to block American infrastructure firms from operating in countries where those products are used for malicious cyber-activity, either by individuals or if the country’s own government is a source of that activity.The order also grants powers to ban or impose conditions on foreigners opening or maintaining accounts with American firms within the U.S. if they are found to be involved in malicious cyber-activity.The Commerce Department is tasked with proposing regulations within six months of the order being issued, but it isn’t clear that the incoming administration led by Joe Biden will implement it.“I could see them adding a comment period or something from the impacted companies,” said Alex Stamos, a Stanford University professor helping SolarWinds’ recovery efforts after its breach, who had served as chief security officer at Facebook until 2018. Biden “might just wholesale wipe out every executive order too.”Read more: SolarWinds Hack Followed Years of Warnings of Weak CybersecurityIn December, Austin, Texas-based SolarWinds found itself at the center of the largest cyber-security attack in recent memory. Suspected Russian hackers breached the internal networks of at least 200 customers, including U.S. government agencies and an as-yet-unknown number of private companies, a cyber-security firm and people familiar with the investigation told Bloomberg News.In an operation that cyber-security experts have described as exceedingly sophisticated and hard to detect, the hackers installed malicious code in updates to SolarWinds’ widely used Orion software, which was sent to as many as 18,000 customers.For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2021 Bloomberg L.P.

Suspected Russian Hackers Targeted Cyber Firm Malwarebytes
Wed, 20 Jan 2021 01:10:59 +0000
(Bloomberg) — Suspected Russian hackers targeted the cybersecurity company Malwarebytes Inc. in the course of a sprawling cyber-attack that breached U.S. government agencies and companies.The attacker abused “applications with privileged access to Microsoft Office 365 and Azure environments,” according to a Tuesday blog post by Chief Executive Officer Marcin Kleczynski. He said the attack was part of the same hacking campaign that has utilized infected software from SolarWinds Corp. to target other organizations.“After an extensive investigation, we determined the attacker only gained access to a limited subset of internal company emails. We found no evidence of unauthorized access or compromise in any of our internal on-premises and production environments,” Kleczynski wrote.U.S. intelligence agencies and the FBI have said the recent hacking campaign — which was found and disclosed by the cybersecurity firm FireEye Inc. in December — was likely undertaken by Russia. In many instances, attackers broke into systems through a compromised version of widely used software from Texas-based SolarWinds Corp.However, analysts have said that SolarWinds’s software wasn’t the only method the suspected Russian hackers used to breach networks. On Tuesday, the firm Symantec discovered a new form of malware used in the attack that wasn’t delivered through SolarWinds, suggesting the hack could be broader than previously understood. The firm CrowdStrike Inc. said the hackers had attempted to break into their networks by compromising a third-party vendor that resells Microsoft services. If a reseller is breached and has access to a client’s credentials, the attacker could then hack into the client’s networks.On Dec. 15, Microsoft alerted Malwarebytes about “suspicious activity from a third-party application” that was consistent with the behaviors of the hackers that had exploited SolarWinds. Upon investigation, Malwarebytes found “no evidence of unauthorized access or compromise in any of our internal on-premises and production environments,” he wrote.Jeff Jones, a Microsoft representative, said in a statement, “Our ongoing investigation of recent attacks has found this advanced and sophisticated threat actor had several techniques in their toolkit. We have not identified any vulnerabilities in our products or cloud services.”Malwarebytes’s disclosure is the latest example of the attackers targeting security companies in the course of the hacking campaign. They stole tools from FireEye and attempted to breach CrowdStrike, the companies said last month.“These attackers were clearly sophisticated and primarily targeted federal agencies and security companies, as far as I’m aware,” Kleczynski said in an email to Bloomberg News.FireEye’s investigation into its own breach last month revealed that the hackers had installed malicious code into SolarWinds’s Orion software, which is used by government agencies and Fortune 500 companies. The malicious code, which customers received by updating the software, provided a launching pad of sorts for further attacks by the hackers into computer networks.According to SolarWinds, as many as 18,000 of its customers may have received infected updates, though the hackers are believed to have conducted further intrusions in far fewer of them. Malwarebytes isn’t a SolarWinds customer.(Updates with Microsoft statement in seventh paragraph.)For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2021 Bloomberg L.P.

GameStop Stock Is Soaring. It Could End Badly.
Tue, 19 Jan 2021 23:46:00 +0000
The stock closed up 11% despite a deteriorating business outlook as gamers shift to free-to-play games and digital downloads. Things could get ugly.

Daily Crunch: Microsoft backs Cruise
Tue, 19 Jan 2021 23:12:20 +0000
Autonomous vehicle company Cruise raises a $2 billion new round, Netflix keeps growing and WhatsApp faces more privacy concerns. Cruise announced today that it has raised $2 billion in new funding at a $30 billion valuation, with Microsoft joining as a new investor.

Related Posts

 

MarketTamer is not an investment advisor and is not registered with the U.S. Securities and Exchange Commission or the Financial Industry Regulatory Authority. Further, owners, employees, agents or representatives of MarketTamer are not acting as investment advisors and might not be registered with the U.S. Securities and Exchange Commission or the Financial Industry Regulatory.


This company makes no representations or warranties concerning the products, practices or procedures of any company or entity mentioned or recommended in this email, and makes no representations or warranties concerning said company or entity’s compliance with applicable laws and regulations, including, but not limited to, regulations promulgated by the SEC or the CFTC. The sender of this email may receive a portion of the proceeds from the sale of any products or services offered by a company or entity mentioned or recommended in this email. The recipient of this email assumes responsibility for conducting its own due diligence on the aforementioned company or entity and assumes full responsibility, and releases the sender from liability, for any purchase or order made from any company or entity mentioned or recommended in this email.


The content on any of MarketTamer websites, products or communication is for educational purposes only. Nothing in its products, services, or communications shall be construed as a solicitation and/or recommendation to buy or sell a security. Trading stocks, options and other securities involves risk. The risk of loss in trading securities can be substantial. The risk involved with trading stocks, options and other securities is not suitable for all investors. Prior to buying or selling an option, an investor must evaluate his/her own personal financial situation and consider all relevant risk factors. See: Characteristics and Risks of Standardized Options. The www.MarketTamer.com educational training program and software services are provided to improve financial understanding.


The information presented in this site is not intended to be used as the sole basis of any investment decisions, nor should it be construed as advice designed to meet the investment needs of any particular investor. Nothing in our research constitutes legal, accounting or tax advice or individually tailored investment advice. Our research is prepared for general circulation and has been prepared without regard to the individual financial circumstances and objectives of persons who receive or obtain access to it. Our research is based on sources that we believe to be reliable. However, we do not make any representation or warranty, expressed or implied, as to the accuracy of our research, the completeness, or correctness or make any guarantee or other promise as to any results that may be obtained from using our research. To the maximum extent permitted by law, neither we, any of our affiliates, nor any other person, shall have any liability whatsoever to any person for any loss or expense, whether direct, indirect, consequential, incidental or otherwise, arising from or relating in any way to any use of or reliance on our research or the information contained therein. Some discussions contain forward looking statements which are based on current expectations and differences can be expected. All of our research, including the estimates, opinions and information contained therein, reflects our judgment as of the publication or other dissemination date of the research and is subject to change without notice. Further, we expressly disclaim any responsibility to update such research. Investing involves substantial risk. Past performance is not a guarantee of future results, and a loss of original capital may occur. No one receiving or accessing our research should make any investment decision without first consulting his or her own personal financial advisor and conducting his or her own research and due diligence, including carefully reviewing any applicable prospectuses, press releases, reports and other public filings of the issuer of any securities being considered. None of the information presented should be construed as an offer to sell or buy any particular security. As always, use your best judgment when investing.