Microsoft Switzerland Security Blog
Security informations brought to you by the Swiss Security Team.
New Zlob variant reconfigures routers
A variant of the Zlob virus has emerged that can tweak DNS entries on standard commercial routers...
Author: Microsoft Swiss Security Team Date: 06/25/2008
Microsoft Security Assessment Tool v.3.5 (2008-06)
The Microsoft Security Assessment Tool (MSAT) is a free tool designed to help organizations like...
Author: Microsoft Swiss Security Team Date: 06/23/2008
Microsoft Malware Removal Starter Kit (2008-06)
Many small- and medium-sized organizations use antivirus software, and yet new viruses, worms,...
Author: Microsoft Swiss Security Team Date: 06/23/2008
Are you a computer security professional?
You know you're a computer security professional when: • Although you have no ill intent, you spend...
Author: Microsoft Swiss Security Team Date: 06/13/2008
Covert channel vulnerabilities in anonymity systems
Excerpt: The spread of wide-scale Internet surveillance has spurred interest in anonymity systems...
Author: Microsoft Swiss Security Team Date: 06/13/2008
OECD: Malicious Software (Malware): A Security Threat to the Internet Economy
Excerpt: This report, developed in collaboration with experts, aims to inform policy makers about...
Author: Microsoft Swiss Security Team Date: 06/13/2008
Microsoft Expands Security Information Sharing Program to CERTs
Today at the annual AusCERT Asia Pacific Information Technology Security Conference, Microsoft Corp....
Author: Microsoft Swiss Security Team Date: 05/28/2008
Draft guidance for securing servers (NIST)
The National Institute of Standards and Technology is seeking comment on its draft guidelines for...
Author: Microsoft Swiss Security Team Date: 05/28/2008
Hackers Find a New Place to Hide Rootkits
Security researchers have developed a new type of malicious rootkit software that hides itself in an...
Author: Microsoft Swiss Security Team Date: 05/28/2008
SQL Injection General Guidance
There s a lot of noise arround currently ongoig SQL injection attacks and even if that is quite an...
Author: Microsoft Swiss Security Team Date: 05/28/2008
Windows Server 2008 Remote Server Administration Tools (RSAT)
RSAT is the collection of Windows Server 2008 management tools which enable IT professionals to...
Author: Microsoft Swiss Security Team Date: 05/27/2008
Thoughts of a Teenage Bot Master
One day in May 2005, a 16-year-old hacker named "SoBe" opened his front door to find a swarm of FBI...
Author: Microsoft Swiss Security Team Date: 05/27/2008
Virtual machines aren't really more secure
Roger A. Grimes: "I've been at several recent conferences where virtual machine (VM) and security...
Author: Microsoft Swiss Security Team Date: 05/27/2008
Microsoft is winning the NAC war, expert says
Security guru Joel Snyder from Opus One recently starred as the guest of a live Network World chat...
Author: Microsoft Swiss Security Team Date: 05/27/2008
Microsoft Botnet-hunting Tool Helps Bust Hackers
Botnet fighters have another tool in their arsenal, thanks to Microsoft. Microsoft is giving law...
Author: Microsoft Swiss Security Team Date: 05/27/2008
Windows Server 20008 Active Directory Certificate Services Upgrade and Migration Guide
Active Directory Certificate Services (AD CS) provides customizable services for issuing and...
Author: Microsoft Swiss Security Team Date: 05/26/2008
Managing the Windows Vista Firewall
If you're an IT pro who is looking a bit more seriously at Windows Vista for your enterprise...
Author: Microsoft Swiss Security Team Date: 05/26/2008
Application Lockdown with Software Restriction Policies
When IT professionals look to reduce the total cost of ownership, or TCO, of their desktop machines,...
Author: Microsoft Swiss Security Team Date: 05/26/2008
New Elevation PowerToys for Windows Vista
Run as Administrator for third-party scripting tools Run as Another User Prompt Here as System for...
Author: Microsoft Swiss Security Team Date: 05/26/2008
The Great Debate: Security by Obscurity
Security by obscurity is, in a nutshell, a violation of Kerckhoffs' Principle, which holds that a...
Author: Microsoft Swiss Security Team Date: 05/26/2008
Advances in BitLocker Drive Encryption
What's new in Windows Vista SP1 or Windows Server 2008 Bitlocker?...
Author: Microsoft Swiss Security Team Date: 05/26/2008
Critical infrastructure central to cyber threat
The United States is increasingly vulnerable to cyberattacks that could have catastrophic effects on...
Author: Microsoft Swiss Security Team Date: 05/14/2008
Cyber-Attacks and Cyber-Disasters: Are You Prepared?
Have you seen the recent television commercial that shows the Pentagon and says, "This building gets...
Author: Microsoft Swiss Security Team Date: 05/14/2008
Web 2.0, meet Internet attack 2.0
The glitzy, interactive abilities of Web 2.0 have led to a profusion of new applications, but the...
Author: Microsoft Swiss Security Team Date: 04/30/2008
To defeat a malicious botnet, build a friendly one
Beating the "botnets"–armies of infected computers used to attack websites–requires borrowing...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Modern 'primitive' could ease the pain of encrypting massive amounts of data
Researchers have devised an encryption scheme that could simplify the protection of sensitive...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Researchers find hole in 'flawless' encryption technology
Quantum cryptography, a new technology until now considered 100 per cent secure against attacks on...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Microsoft: We took out Storm botnet
Microsoft Corp. today took credit for crushing the Storm botnet, saying that the malware...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Infosec/Microsoft: Security community must work together
Microsoft has called on companies to work together to improve overall security, and not just rely on...
Author: Microsoft Swiss Security Team Date: 04/30/2008
FBI organizes defense against cyber-attacks
The FBI quietly established last summer a task force involving U.S. intelligence and other agencies...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Shrinking patch windows hit by automated attacks
The length of time between the development of security patches and the development of exploits...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Cyber Criminals Shifting Targets To Mobiles
Mobile networks and handsets are becoming more of a target for criminals with a technical bent,...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Automatic Patch-Based Exploit Generation
Paper Abstract:In this paper, we propose techniques for automatic patch-based exploit generation,...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Security is no match for chocolate and good looking women
A survey out today by the organizers of the tech-security conference Infosecurity Europe found that...
Author: Microsoft Swiss Security Team Date: 04/28/2008
Beta release of Microsoft Windows Live OneCare 2.5
A beta release of Windows Live OneCare 2.5, Microsoft's automated security suite for home users and...
Author: Microsoft Swiss Security Team Date: 04/28/2008
Microsoft Releases Beta of Integrated Security System Forefront “Stirling”
At RSA Conference 2008, Microsoft announced the availability of the public beta release of its...
Author: Microsoft Swiss Security Team Date: 04/11/2008
Microsoft calls for talks on Internet trust, safety
Microsoft today called for broad discussions about the safety of the Internet in an initiative it...
Author: Microsoft Swiss Security Team Date: 04/11/2008
Outsource your code & you're more likely to be hacked
In a new report released by European information technology analysis group, Quocirca, organisations...
Author: Microsoft Swiss Security Team Date: 04/11/2008
Windows Vista SP1 Prerequisite KB937287
Back in February, Microsoft posted about the release of prerequisites for Windows Vista Service Pack...
Author: Microsoft Swiss Security Team Date: 04/10/2008
IC3's 2007 Internet Crime Report
The USA's Internet Crime Complaint Center (IC3) is a partnership between the FBI and the National...
Author: Microsoft Swiss Security Team Date: 04/10/2008
New massive Botnet twice the size of Storm
A new botnet twice the size of Storm has ballooned to an army of over 400,000 bots, including...
Author: Microsoft Swiss Security Team Date: 04/10/2008
The difference between feeling and reality in Security
Security is both a feeling and a reality, and they're different. You can feel secure even though...
Author: Microsoft Swiss Security Team Date: 04/08/2008
Don't blame 'stupid users' for data breaches
Security breaches that can be traced back to the actions of one individual are not the fault of one...
Author: Microsoft Swiss Security Team Date: 04/08/2008
PGP adds encryption to Windows Mobile Smartphones
PGP Corp. has introduced an encryption application that lets enterprise users protect all the data...
Author: Microsoft Swiss Security Team Date: 04/08/2008
Internet Telephony has Security problems
Phone calls that are routed through the Internet instead of telephone wires are increasingly popular...
Author: Microsoft Swiss Security Team Date: 04/08/2008
Hacker group threatens to release Merkel's fingerprints
The Chaos Computer Club (CCC), one of Germany's oldest and largest hacker organisations, threatened...
Author: Microsoft Swiss Security Team Date: 04/03/2008
Interview: Mitnick on avoiding fraudsters
You know that hidden bomb shtick in the movies? There's a bomb that's going to go off and kill a...
Author: Microsoft Swiss Security Team Date: 04/03/2008