Freigeben über


Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Black Hat: new operating systems security metric

At the Black Hat Security Conference currently taking place in Amsterdam, researchers from the...

Author: Microsoft Swiss Security Team Date: 04/03/2008

Microsoft scoops up rootkit finder Komoku

The start-up's rootkit detection technology will be added into Microsoft's Windows Live OneCare and...

Author: Microsoft Swiss Security Team Date: 03/29/2008

Spyware authors offer dollars for downloads

Spyware authors are offering financial rewards to botnet operators and other cyber-criminals who...

Author: Microsoft Swiss Security Team Date: 03/29/2008

IBM: Apple Crumble @ Blackhat

In addition to my previous blog post:...

Author: Microsoft Swiss Security Team Date: 03/29/2008

Black Hat: Who patches security holes faster, Microsoft or Apple?

Apple's teasing commercials that imply its software is safer than Microsoft's may not quite match...

Author: Microsoft Swiss Security Team Date: 03/29/2008

Sun and Apple Updates – A Sheer Nuisance!!

From Roger's blog...

Author: Microsoft Swiss Security Team Date: 03/26/2008

Inside the Twisted Mind of the Security Professional

Bruce Schneier: "Uncle Milton Industries has been selling ant farms to children since 1956. Some...

Author: Microsoft Swiss Security Team Date: 03/26/2008

Security researchers show how to hook phishers

Security researchers are cooking up tactics for beating phishing fraudsters at their own game....

Author: Microsoft Swiss Security Team Date: 03/26/2008

Business biometrics raises ID theft risk

The commercial use of biometrics will become widespread in five years, but is not without security...

Author: Microsoft Swiss Security Team Date: 03/26/2008

Anatomy of a SQL Injection Incident

Blog Posting from Neil Carpenter: "A number of people are reporting that 10K+ Web sites have been...

Author: Microsoft Swiss Security Team Date: 03/26/2008

Security guide to customs-proofing your laptop

If you travel across national borders, it's time to customs-proof your laptop. Customs officials...

Author: Microsoft Swiss Security Team Date: 03/26/2008

New Book: The New School of Information Security

New Book: The New School of Information Security by Adam Shostack and Andrew Stewart About the...

Author: Microsoft Swiss Security Team Date: 03/13/2008

Dropping 22TB of patches on 6,500 PCs in 4 hours: BitTorrent

Apparently, software updates are getting so big these days that simply downloading them from a...

Author: Microsoft Swiss Security Team Date: 03/13/2008

Generate Your Own Security Code Review Checklist Document

In this post from the ACE Team, they show how to generate Security Code Review Checklist using...

Author: Microsoft Swiss Security Team Date: 03/12/2008

Internet Explorer 8 Readiness Toolkit

We just made Internet Explorer 8 Beta 1 available. This could be important if you are developing web...

Author: Microsoft Swiss Security Team Date: 03/12/2008

Microsoft buys U-Prove technology

Microsoft Corp. hopes to beef up online privacy with the acquisition of the U-Prove technology, the...

Author: Microsoft Swiss Security Team Date: 03/12/2008

Cisco hops onto patching treadmill

Cisco has taken a leaf out of Microsoft's book by adopting a regular patch release cycle. However,...

Author: Microsoft Swiss Security Team Date: 03/12/2008

Model predicts chance of software flaws

Researchers from a German university have developed a model to predict programming errors in...

Author: Microsoft Swiss Security Team Date: 03/12/2008

New Method IDs Phishing, Malicious Domains

At a closed-door security summit hosted on Yahoo’s Sunnyvale campus last week, a researcher...

Author: Microsoft Swiss Security Team Date: 03/12/2008

A guide to basic computer forensics

While some investigations rely on highly trained professionals using expensive tools and complex...

Author: Microsoft Swiss Security Team Date: 03/12/2008

The Anti-Phishing Working Group (APWG) has just released their Phishing Activity Trends Report for...

Author: Microsoft Swiss Security Team Date: 03/12/2008

Ballmer Outlines Vision For Next Computing Revolution

The rise of PCs, graphical user interfaces, the Internet, and Web 2.0 technologies have obviously...

Author: Microsoft Swiss Security Team Date: 03/10/2008

Identity management critical for security, government IT shops say

A majority of government IT organizations say identity management is very important to securing...

Author: Microsoft Swiss Security Team Date: 03/07/2008

Study: Consumers Don't Use Anti-Phishing Defenses

"Across the globe, Windows Internet Explorer 7 has more than 100 million users seeing green,"...

Author: Microsoft Swiss Security Team Date: 03/07/2008

Windows XP Service Pack 3 Overview

Windows XP Service Pack 3 (SP3) includes all previously released updates for the operating system....

Author: Microsoft Swiss Security Team Date: 02/28/2008

Windows Server 2008 Security Guide released

The Windows Server 2008 Security Guide provides customers with best practices, predefined security...

Author: Microsoft Swiss Security Team Date: 02/28/2008

The First Step on the Road to More Secure Software is admitting you have a Problem

Michael Howard on SDL and the need for it; comments onJeff Jones blogs. See SDL blog:...

Author: Microsoft Swiss Security Team Date: 02/27/2008

Windows Server 2008 Resource Kit

Last Friday the last of the Windows Server 2008 Security Resource Kit finally went to press! This...

Author: Microsoft Swiss Security Team Date: 02/27/2008

'Out of office' messages turned into spam relays

Spammers have found a new trick that gets around many current anti-spam filters: abusing the "out of...

Author: Microsoft Swiss Security Team Date: 02/27/2008

Microsoft's glasnost on interoperability means more bugs [?]

Microsoft's decision last week to let everyone snoop through its software secrets means...

Author: Microsoft Swiss Security Team Date: 02/27/2008

E-mail typosquatting poses leakage threat

Companies and political organizations should put more effort into registering mis-typed versions of...

Author: Microsoft Swiss Security Team Date: 02/27/2008

Hacking the lobby telephone

Two security researchers at ShmooCon demonstrated on Saturday how a laptop connected to a VoIP...

Author: Microsoft Swiss Security Team Date: 02/27/2008

Swissdialogue / MS Switzerland Citizenship blog entry: Kriminelle Energie ist überall – auch im Internet

For the german speaking readers, also a link to my citizenship blog entry: "Kriminelle Energie ist...

Author: Microsoft Swiss Security Team Date: 02/21/2008

ITU study group Q.22/1 - Report on best practices for a national approach to cybersecurity

A management framework for organizing national cybersecurity efforts:...

Author: Microsoft Swiss Security Team Date: 02/21/2008

Introducing SAFECode [Michael Howard]

SAFECode, the Software Assurance Forum for Excellence in Code, introduced its first white paper,...

Author: Microsoft Swiss Security Team Date: 02/21/2008

Encryption Brings New Risks, Experts Say

Security workers warn that encrypting stored data doesn't truly protect it, and you're fooling...

Author: Microsoft Swiss Security Team Date: 02/21/2008

Security for the youngest internet users - Security4Kids

Have you ever heard about www.security4kids.ch? If not, visiting the site should be one of your...

Author: Microsoft Swiss Security Team Date: 02/21/2008

Microsoft Forefront Client Security benchmark test (West Coast Lab)

Microsoft Corporation commissioned West Coast Labs (WCL) to carry out a series of performance...

Author: Microsoft Swiss Security Team Date: 02/14/2008

German Police Creating LE Trojan

German cops are pushing ahead with controversial plans, yet to be legally approved, to develop...

Author: Microsoft Swiss Security Team Date: 02/14/2008

CIA Monitors YouTube For Intelligence

U.S. spies are looking increasingly online for intelligence and they've become major consumers of...

Author: Microsoft Swiss Security Team Date: 02/14/2008

Europe still top source of spam

European spam networks have pumped out more unsolicited e-mail than those in the U.S. for the third...

Author: Microsoft Swiss Security Team Date: 02/07/2008

Minimizing User Rights Can Increase Security

Taking a least-privilege approach to user accounts is a key part of any in-depth defense strategy,...

Author: Microsoft Swiss Security Team Date: 02/07/2008

EISAS – European Information Sharing and Alert System - A Feasibility Study

ENISA is presenting the first feasibility study on a European Information Sharing and Alert System...

Author: Microsoft Swiss Security Team Date: 02/07/2008

Big trouble with teen hackers

Teenagers, including children as young as eleven and twelve years old, are increasingly becoming...

Author: Microsoft Swiss Security Team Date: 02/07/2008

Remote Workers Still Living Dangerously, Cisco Study Says

If it seems that -- despite your company's best efforts to educate users about security -- users are...

Author: Microsoft Swiss Security Team Date: 02/07/2008

Wireless phone headsets insecure?

Analysis: Wireless phone headsets of the kind beloved by Wall Street executives and high-end law...

Author: Microsoft Swiss Security Team Date: 02/07/2008

Forensics Plan Guide (GIAC)

The Forensics Plan Guide defines the basic elements of a Forensic Plan from the first initial...

Author: Microsoft Swiss Security Team Date: 02/04/2008

Microsoft adds new Anti-Exploit APIs into Windows

Microsoft has announced plans to add new anti-exploitation APIs into Windows Vista SP1, Windows XP...

Author: Microsoft Swiss Security Team Date: 02/04/2008

Download: Windows Vista One Year Vulnerability Report

Excerpt of a blog by Jeff Jones: Windows Vista shipped to business customers on the last day of...

Author: Microsoft Swiss Security Team Date: 01/29/2008

<Previous Next>