Microsoft Switzerland Security Blog
Security informations brought to you by the Swiss Security Team.
Black Hat: new operating systems security metric
At the Black Hat Security Conference currently taking place in Amsterdam, researchers from the...
Author: Microsoft Swiss Security Team Date: 04/03/2008
Microsoft scoops up rootkit finder Komoku
The start-up's rootkit detection technology will be added into Microsoft's Windows Live OneCare and...
Author: Microsoft Swiss Security Team Date: 03/29/2008
Spyware authors offer dollars for downloads
Spyware authors are offering financial rewards to botnet operators and other cyber-criminals who...
Author: Microsoft Swiss Security Team Date: 03/29/2008
IBM: Apple Crumble @ Blackhat
In addition to my previous blog post:...
Author: Microsoft Swiss Security Team Date: 03/29/2008
Black Hat: Who patches security holes faster, Microsoft or Apple?
Apple's teasing commercials that imply its software is safer than Microsoft's may not quite match...
Author: Microsoft Swiss Security Team Date: 03/29/2008
Sun and Apple Updates – A Sheer Nuisance!!
From Roger's blog...
Author: Microsoft Swiss Security Team Date: 03/26/2008
Inside the Twisted Mind of the Security Professional
Bruce Schneier: "Uncle Milton Industries has been selling ant farms to children since 1956. Some...
Author: Microsoft Swiss Security Team Date: 03/26/2008
Security researchers show how to hook phishers
Security researchers are cooking up tactics for beating phishing fraudsters at their own game....
Author: Microsoft Swiss Security Team Date: 03/26/2008
Business biometrics raises ID theft risk
The commercial use of biometrics will become widespread in five years, but is not without security...
Author: Microsoft Swiss Security Team Date: 03/26/2008
Anatomy of a SQL Injection Incident
Blog Posting from Neil Carpenter: "A number of people are reporting that 10K+ Web sites have been...
Author: Microsoft Swiss Security Team Date: 03/26/2008
Security guide to customs-proofing your laptop
If you travel across national borders, it's time to customs-proof your laptop. Customs officials...
Author: Microsoft Swiss Security Team Date: 03/26/2008
New Book: The New School of Information Security
New Book: The New School of Information Security by Adam Shostack and Andrew Stewart About the...
Author: Microsoft Swiss Security Team Date: 03/13/2008
Dropping 22TB of patches on 6,500 PCs in 4 hours: BitTorrent
Apparently, software updates are getting so big these days that simply downloading them from a...
Author: Microsoft Swiss Security Team Date: 03/13/2008
Generate Your Own Security Code Review Checklist Document
In this post from the ACE Team, they show how to generate Security Code Review Checklist using...
Author: Microsoft Swiss Security Team Date: 03/12/2008
Internet Explorer 8 Readiness Toolkit
We just made Internet Explorer 8 Beta 1 available. This could be important if you are developing web...
Author: Microsoft Swiss Security Team Date: 03/12/2008
Microsoft buys U-Prove technology
Microsoft Corp. hopes to beef up online privacy with the acquisition of the U-Prove technology, the...
Author: Microsoft Swiss Security Team Date: 03/12/2008
Cisco hops onto patching treadmill
Cisco has taken a leaf out of Microsoft's book by adopting a regular patch release cycle. However,...
Author: Microsoft Swiss Security Team Date: 03/12/2008
Model predicts chance of software flaws
Researchers from a German university have developed a model to predict programming errors in...
Author: Microsoft Swiss Security Team Date: 03/12/2008
New Method IDs Phishing, Malicious Domains
At a closed-door security summit hosted on Yahoo’s Sunnyvale campus last week, a researcher...
Author: Microsoft Swiss Security Team Date: 03/12/2008
A guide to basic computer forensics
While some investigations rely on highly trained professionals using expensive tools and complex...
Author: Microsoft Swiss Security Team Date: 03/12/2008
APWG Releases Phishing Activity Trends
The Anti-Phishing Working Group (APWG) has just released their Phishing Activity Trends Report for...
Author: Microsoft Swiss Security Team Date: 03/12/2008
Ballmer Outlines Vision For Next Computing Revolution
The rise of PCs, graphical user interfaces, the Internet, and Web 2.0 technologies have obviously...
Author: Microsoft Swiss Security Team Date: 03/10/2008
Identity management critical for security, government IT shops say
A majority of government IT organizations say identity management is very important to securing...
Author: Microsoft Swiss Security Team Date: 03/07/2008
Study: Consumers Don't Use Anti-Phishing Defenses
"Across the globe, Windows Internet Explorer 7 has more than 100 million users seeing green,"...
Author: Microsoft Swiss Security Team Date: 03/07/2008
Windows XP Service Pack 3 Overview
Windows XP Service Pack 3 (SP3) includes all previously released updates for the operating system....
Author: Microsoft Swiss Security Team Date: 02/28/2008
Windows Server 2008 Security Guide released
The Windows Server 2008 Security Guide provides customers with best practices, predefined security...
Author: Microsoft Swiss Security Team Date: 02/28/2008
The First Step on the Road to More Secure Software is admitting you have a Problem
Michael Howard on SDL and the need for it; comments onJeff Jones blogs. See SDL blog:...
Author: Microsoft Swiss Security Team Date: 02/27/2008
Windows Server 2008 Resource Kit
Last Friday the last of the Windows Server 2008 Security Resource Kit finally went to press! This...
Author: Microsoft Swiss Security Team Date: 02/27/2008
'Out of office' messages turned into spam relays
Spammers have found a new trick that gets around many current anti-spam filters: abusing the "out of...
Author: Microsoft Swiss Security Team Date: 02/27/2008
Microsoft's glasnost on interoperability means more bugs [?]
Microsoft's decision last week to let everyone snoop through its software secrets means...
Author: Microsoft Swiss Security Team Date: 02/27/2008
E-mail typosquatting poses leakage threat
Companies and political organizations should put more effort into registering mis-typed versions of...
Author: Microsoft Swiss Security Team Date: 02/27/2008
Hacking the lobby telephone
Two security researchers at ShmooCon demonstrated on Saturday how a laptop connected to a VoIP...
Author: Microsoft Swiss Security Team Date: 02/27/2008
Swissdialogue / MS Switzerland Citizenship blog entry: Kriminelle Energie ist überall – auch im Internet
For the german speaking readers, also a link to my citizenship blog entry: "Kriminelle Energie ist...
Author: Microsoft Swiss Security Team Date: 02/21/2008
ITU study group Q.22/1 - Report on best practices for a national approach to cybersecurity
A management framework for organizing national cybersecurity efforts:...
Author: Microsoft Swiss Security Team Date: 02/21/2008
Introducing SAFECode [Michael Howard]
SAFECode, the Software Assurance Forum for Excellence in Code, introduced its first white paper,...
Author: Microsoft Swiss Security Team Date: 02/21/2008
Encryption Brings New Risks, Experts Say
Security workers warn that encrypting stored data doesn't truly protect it, and you're fooling...
Author: Microsoft Swiss Security Team Date: 02/21/2008
Security for the youngest internet users - Security4Kids
Have you ever heard about www.security4kids.ch? If not, visiting the site should be one of your...
Author: Microsoft Swiss Security Team Date: 02/21/2008
Microsoft Forefront Client Security benchmark test (West Coast Lab)
Microsoft Corporation commissioned West Coast Labs (WCL) to carry out a series of performance...
Author: Microsoft Swiss Security Team Date: 02/14/2008
German Police Creating LE Trojan
German cops are pushing ahead with controversial plans, yet to be legally approved, to develop...
Author: Microsoft Swiss Security Team Date: 02/14/2008
CIA Monitors YouTube For Intelligence
U.S. spies are looking increasingly online for intelligence and they've become major consumers of...
Author: Microsoft Swiss Security Team Date: 02/14/2008
Europe still top source of spam
European spam networks have pumped out more unsolicited e-mail than those in the U.S. for the third...
Author: Microsoft Swiss Security Team Date: 02/07/2008
Minimizing User Rights Can Increase Security
Taking a least-privilege approach to user accounts is a key part of any in-depth defense strategy,...
Author: Microsoft Swiss Security Team Date: 02/07/2008
EISAS – European Information Sharing and Alert System - A Feasibility Study
ENISA is presenting the first feasibility study on a European Information Sharing and Alert System...
Author: Microsoft Swiss Security Team Date: 02/07/2008
Big trouble with teen hackers
Teenagers, including children as young as eleven and twelve years old, are increasingly becoming...
Author: Microsoft Swiss Security Team Date: 02/07/2008
Remote Workers Still Living Dangerously, Cisco Study Says
If it seems that -- despite your company's best efforts to educate users about security -- users are...
Author: Microsoft Swiss Security Team Date: 02/07/2008
Wireless phone headsets insecure?
Analysis: Wireless phone headsets of the kind beloved by Wall Street executives and high-end law...
Author: Microsoft Swiss Security Team Date: 02/07/2008
Forensics Plan Guide (GIAC)
The Forensics Plan Guide defines the basic elements of a Forensic Plan from the first initial...
Author: Microsoft Swiss Security Team Date: 02/04/2008
Microsoft adds new Anti-Exploit APIs into Windows
Microsoft has announced plans to add new anti-exploitation APIs into Windows Vista SP1, Windows XP...
Author: Microsoft Swiss Security Team Date: 02/04/2008
Download: Windows Vista One Year Vulnerability Report
Excerpt of a blog by Jeff Jones: Windows Vista shipped to business customers on the last day of...
Author: Microsoft Swiss Security Team Date: 01/29/2008