次の方法で共有


Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

New Zlob variant reconfigures routers

A variant of the Zlob virus has emerged that can tweak DNS entries on standard commercial routers...

Author: Microsoft Swiss Security Team Date: 06/25/2008

Microsoft Security Assessment Tool v.3.5 (2008-06)

The Microsoft Security Assessment Tool (MSAT) is a free tool designed to help organizations like...

Author: Microsoft Swiss Security Team Date: 06/23/2008

Microsoft Malware Removal Starter Kit (2008-06)

Many small- and medium-sized organizations use antivirus software, and yet new viruses, worms,...

Author: Microsoft Swiss Security Team Date: 06/23/2008

Are you a computer security professional?

You know you're a computer security professional when: • Although you have no ill intent, you spend...

Author: Microsoft Swiss Security Team Date: 06/13/2008

Covert channel vulnerabilities in anonymity systems

Excerpt: The spread of wide-scale Internet surveillance has spurred interest in anonymity systems...

Author: Microsoft Swiss Security Team Date: 06/13/2008

OECD: Malicious Software (Malware): A Security Threat to the Internet Economy

Excerpt: This report, developed in collaboration with experts, aims to inform policy makers about...

Author: Microsoft Swiss Security Team Date: 06/13/2008

Microsoft Expands Security Information Sharing Program to CERTs

Today at the annual AusCERT Asia Pacific Information Technology Security Conference, Microsoft Corp....

Author: Microsoft Swiss Security Team Date: 05/28/2008

Draft guidance for securing servers (NIST)

The National Institute of Standards and Technology is seeking comment on its draft guidelines for...

Author: Microsoft Swiss Security Team Date: 05/28/2008

Hackers Find a New Place to Hide Rootkits

Security researchers have developed a new type of malicious rootkit software that hides itself in an...

Author: Microsoft Swiss Security Team Date: 05/28/2008

SQL Injection General Guidance

There s a lot of noise arround currently ongoig SQL injection attacks and even if that is quite an...

Author: Microsoft Swiss Security Team Date: 05/28/2008

Windows Server 2008 Remote Server Administration Tools (RSAT)

RSAT is the collection of Windows Server 2008 management tools which enable IT professionals to...

Author: Microsoft Swiss Security Team Date: 05/27/2008

Thoughts of a Teenage Bot Master

One day in May 2005, a 16-year-old hacker named "SoBe" opened his front door to find a swarm of FBI...

Author: Microsoft Swiss Security Team Date: 05/27/2008

Virtual machines aren't really more secure

Roger A. Grimes: "I've been at several recent conferences where virtual machine (VM) and security...

Author: Microsoft Swiss Security Team Date: 05/27/2008

Microsoft is winning the NAC war, expert says

Security guru Joel Snyder from Opus One recently starred as the guest of a live Network World chat...

Author: Microsoft Swiss Security Team Date: 05/27/2008

Microsoft Botnet-hunting Tool Helps Bust Hackers

Botnet fighters have another tool in their arsenal, thanks to Microsoft. Microsoft is giving law...

Author: Microsoft Swiss Security Team Date: 05/27/2008

Windows Server 20008 Active Directory Certificate Services Upgrade and Migration Guide

Active Directory Certificate Services (AD CS) provides customizable services for issuing and...

Author: Microsoft Swiss Security Team Date: 05/26/2008

Managing the Windows Vista Firewall

If you're an IT pro who is looking a bit more seriously at Windows Vista for your enterprise...

Author: Microsoft Swiss Security Team Date: 05/26/2008

Application Lockdown with Software Restriction Policies

When IT professionals look to reduce the total cost of ownership, or TCO, of their desktop machines,...

Author: Microsoft Swiss Security Team Date: 05/26/2008

New Elevation PowerToys for Windows Vista

Run as Administrator for third-party scripting tools Run as Another User Prompt Here as System for...

Author: Microsoft Swiss Security Team Date: 05/26/2008

The Great Debate: Security by Obscurity

Security by obscurity is, in a nutshell, a violation of Kerckhoffs' Principle, which holds that a...

Author: Microsoft Swiss Security Team Date: 05/26/2008

Advances in BitLocker Drive Encryption

What's new in Windows Vista SP1 or Windows Server 2008 Bitlocker?...

Author: Microsoft Swiss Security Team Date: 05/26/2008

Critical infrastructure central to cyber threat

The United States is increasingly vulnerable to cyberattacks that could have catastrophic effects on...

Author: Microsoft Swiss Security Team Date: 05/14/2008

Cyber-Attacks and Cyber-Disasters: Are You Prepared?

Have you seen the recent television commercial that shows the Pentagon and says, "This building gets...

Author: Microsoft Swiss Security Team Date: 05/14/2008

Web 2.0, meet Internet attack 2.0

The glitzy, interactive abilities of Web 2.0 have led to a profusion of new applications, but the...

Author: Microsoft Swiss Security Team Date: 04/30/2008

To defeat a malicious botnet, build a friendly one

Beating the "botnets"–armies of infected computers used to attack websites–requires borrowing...

Author: Microsoft Swiss Security Team Date: 04/30/2008

Modern 'primitive' could ease the pain of encrypting massive amounts of data

Researchers have devised an encryption scheme that could simplify the protection of sensitive...

Author: Microsoft Swiss Security Team Date: 04/30/2008

Researchers find hole in 'flawless' encryption technology

Quantum cryptography, a new technology until now considered 100 per cent secure against attacks on...

Author: Microsoft Swiss Security Team Date: 04/30/2008

Microsoft: We took out Storm botnet

Microsoft Corp. today took credit for crushing the Storm botnet, saying that the malware...

Author: Microsoft Swiss Security Team Date: 04/30/2008

Infosec/Microsoft: Security community must work together

Microsoft has called on companies to work together to improve overall security, and not just rely on...

Author: Microsoft Swiss Security Team Date: 04/30/2008

FBI organizes defense against cyber-attacks

The FBI quietly established last summer a task force involving U.S. intelligence and other agencies...

Author: Microsoft Swiss Security Team Date: 04/30/2008

Shrinking patch windows hit by automated attacks

The length of time between the development of security patches and the development of exploits...

Author: Microsoft Swiss Security Team Date: 04/30/2008

Cyber Criminals Shifting Targets To Mobiles

Mobile networks and handsets are becoming more of a target for criminals with a technical bent,...

Author: Microsoft Swiss Security Team Date: 04/30/2008

Automatic Patch-Based Exploit Generation

Paper Abstract:In this paper, we propose techniques for automatic patch-based exploit generation,...

Author: Microsoft Swiss Security Team Date: 04/30/2008

Security is no match for chocolate and good looking women

A survey out today by the organizers of the tech-security conference Infosecurity Europe found that...

Author: Microsoft Swiss Security Team Date: 04/28/2008

Beta release of Microsoft Windows Live OneCare 2.5

A beta release of Windows Live OneCare 2.5, Microsoft's automated security suite for home users and...

Author: Microsoft Swiss Security Team Date: 04/28/2008

Microsoft Releases Beta of Integrated Security System Forefront “Stirling”

At RSA Conference 2008, Microsoft announced the availability of the public beta release of its...

Author: Microsoft Swiss Security Team Date: 04/11/2008

Microsoft calls for talks on Internet trust, safety

Microsoft today called for broad discussions about the safety of the Internet in an initiative it...

Author: Microsoft Swiss Security Team Date: 04/11/2008

Outsource your code & you're more likely to be hacked

In a new report released by European information technology analysis group, Quocirca, organisations...

Author: Microsoft Swiss Security Team Date: 04/11/2008

Windows Vista SP1 Prerequisite KB937287

Back in February, Microsoft posted about the release of prerequisites for Windows Vista Service Pack...

Author: Microsoft Swiss Security Team Date: 04/10/2008

IC3's 2007 Internet Crime Report

The USA's Internet Crime Complaint Center (IC3) is a partnership between the FBI and the National...

Author: Microsoft Swiss Security Team Date: 04/10/2008

New massive Botnet twice the size of Storm

A new botnet twice the size of Storm has ballooned to an army of over 400,000 bots, including...

Author: Microsoft Swiss Security Team Date: 04/10/2008

The difference between feeling and reality in Security

Security is both a feeling and a reality, and they're different. You can feel secure even though...

Author: Microsoft Swiss Security Team Date: 04/08/2008

Don't blame 'stupid users' for data breaches

Security breaches that can be traced back to the actions of one individual are not the fault of one...

Author: Microsoft Swiss Security Team Date: 04/08/2008

PGP adds encryption to Windows Mobile Smartphones

PGP Corp. has introduced an encryption application that lets enterprise users protect all the data...

Author: Microsoft Swiss Security Team Date: 04/08/2008

Internet Telephony has Security problems

Phone calls that are routed through the Internet instead of telephone wires are increasingly popular...

Author: Microsoft Swiss Security Team Date: 04/08/2008

Hacker group threatens to release Merkel's fingerprints

The Chaos Computer Club (CCC), one of Germany's oldest and largest hacker organisations, threatened...

Author: Microsoft Swiss Security Team Date: 04/03/2008

Interview: Mitnick on avoiding fraudsters

You know that hidden bomb shtick in the movies? There's a bomb that's going to go off and kill a...

Author: Microsoft Swiss Security Team Date: 04/03/2008

<Previous Next>