Del via


Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Exchange Server 2003 Common Criteria Certification

Microsoft is deeply committed to optimizing the security of its products and services. As part of...

Author: Microsoft Swiss Security Team Date: 11/18/2005

VoIP Security Whitepaper

Nothing extremely urgent but extremely interesting: The BSI (Bundesamt für Sicherheit in der...

Author: Microsoft Swiss Security Team Date: 11/14/2005

Sony's DRM to be removed by Microsoft Anti-Spyware

We haven been asked frequently whether our Anti-Spyware solution will detect and remove the Sony...

Author: Microsoft Swiss Security Team Date: 11/13/2005

First backdoor (bot) uses Sony DRM software to hide

Breplibot.b is a backdoor with bot capabilities. It connects to several IRC servers and waits for...

Author: Microsoft Swiss Security Team Date: 11/11/2005

Microsoft Security Advisory: Macromedia Flash Player Vulnerabilities

Microsoft released a security Advisory on recent security vulnerabilities in Macromedia Flash...

Author: Microsoft Swiss Security Team Date: 11/11/2005

Hidden Administrator Accounts with No Passwords on Sony Vaio?

If this article is actually true, then the Sony setup creates under certain circumstances a hidden...

Author: Microsoft Swiss Security Team Date: 11/08/2005

Announcing Windows Defender!

From the product team directly: Every week seems like a big week for us in the engineering team...

Author: Microsoft Swiss Security Team Date: 11/07/2005

Security goes "Life"

You probably saw our recent announcements about Windows Life and Office Life. As part of Windows...

Author: Microsoft Swiss Security Team Date: 11/03/2005

The dark side of the force: Rootkits to enforce DRM!

Some DRM systems have started to use rootkit technology. Rootkits are normally associated with...

Author: Microsoft Swiss Security Team Date: 11/02/2005

When do we see the first automated IM worm?

Bascially there are two attack vectors that have not yet been exploited heavily: Mobile Devices and...

Author: Microsoft Swiss Security Team Date: 11/02/2005

"Track Changes" Reveals Sensitive Information at UN

It is definitely not new but from time to time information leaks thorugh the improper use of the...

Author: Microsoft Swiss Security Team Date: 10/27/2005

Chatter about Attacks on October Updates

Since weeks now we hear a lot of chatter about attacks on the October security updates. It is true...

Author: Microsoft Swiss Security Team Date: 10/25/2005

Microsoft Phishing Filter Add-in for MSN Search Toolbar (Beta)

Microsoft® Phishing Filter Add-in for MSN® Search Toolbar (Beta) Dynamic Service Helps Protect...

Author: Microsoft Swiss Security Team Date: 10/22/2005

Issues with MS05-051

We get a lot of questions about MS05-051 and whether there are issues with this Update. Yes, we know...

Author: Microsoft Swiss Security Team Date: 10/19/2005

Reducing the Risk of Browsing

Have you ever wondered how you could reduce the privileges a browser (I mean any browser) has in...

Author: Microsoft Swiss Security Team Date: 10/19/2005

Security Self-Assessment Tool for Midsized Companies

I know that I am just repeating myself - but during the ITPro/Partner Roadshow, I have been asked...

Author: Microsoft Swiss Security Team Date: 10/14/2005

Questions about our Patches?

Yesterday we released a few patches. We are convinced that you have good information about the...

Author: Microsoft Swiss Security Team Date: 10/12/2005

Large Botnet taken down

This seems to be a great success in the fight against botnets: In the Netherlands a botnet with more...

Author: Microsoft Swiss Security Team Date: 10/11/2005

Microsoft Client Protection

Well, I know that two posts area a lot per day but this is too important to omit. Since months I...

Author: Microsoft Swiss Security Team Date: 10/06/2005

Are online firms doing secret deals with DDoS attackers?

At the moment we are running our ITPro/Partenr Roadshow throughout Switzerland. During my seucrity...

Author: Microsoft Swiss Security Team Date: 10/06/2005

Windows NT 4.0 and Windows 98 Threat Mitigation Guide

The Microsoft Windows NT 4.0 and Windows 98 Threat Mitigation Guide describes the process of...

Author: Microsoft Swiss Security Team Date: 10/05/2005

Microsoft, Motorola Team On Public Safety Software

Microsoft is joining with Motorola in an alliance to improve software applications for public safety...

Author: Microsoft Swiss Security Team Date: 10/05/2005

System Virginity Verifier

The idea behind SVV is to check important Windows System components, which are usually altered by...

Author: Microsoft Swiss Security Team Date: 10/05/2005

Night Time Just Got a Little Brighter!

Now you can easily move handsfree around a darkened house reducing the risk of tripping over objects...

Author: Microsoft Swiss Security Team Date: 10/04/2005

Bluetooth device security database

There are many different types of bluetooth devices like mobile phones, PDAs or printers which...

Author: Microsoft Swiss Security Team Date: 10/04/2005

IE 7 gets good feedback at "Hack in a Box"

It is amazing to see that we are getting positive feedback for our security efforts. We showed Beta2...

Author: Microsoft Swiss Security Team Date: 10/03/2005

Online Lecture - Ross Anderson: Information Hiding

Over the last five years, techniques for hiding information have become a rapidly growing research...

Author: Microsoft Swiss Security Team Date: 09/27/2005

Privacy: Google's power makes security officials nervous

Google's power makes security officials nervous. Google has fast become the Internet search engine...

Author: Microsoft Swiss Security Team Date: 09/27/2005

A week in Redmond

During the last week, I have been on the Microsoft Campus in Redmond. We had the Quarterly Meeting...

Author: Microsoft Swiss Security Team Date: 09/24/2005

Organisations need a digital evidence plan

Businesses could lose legal disputes and miss out on insurance claims because of their inability to...

Author: Microsoft Swiss Security Team Date: 09/23/2005

NSA granted Net location-tracking patent

The National Security Agency has obtained a patent on a method of figuring out an Internet user's...

Author: Microsoft Swiss Security Team Date: 09/23/2005

Is the Firefox honeymoon over?

Firefox not only has more vulnerabilities per month than Internet Explorer, but it is now surpassing...

Author: Microsoft Swiss Security Team Date: 09/21/2005

Shared Computer Toolkit

Have you ever had the taks to setup a computer that is used by several "public" users? Like at...

Author: Microsoft Swiss Security Team Date: 09/20/2005

Microsoft aquired Alacris

Since quite some time we are working with Alacris on PKI projects. Alacris' idNexus was always a...

Author: Microsoft Swiss Security Team Date: 09/19/2005

Beyond "Blaster" - MSRPC Evasions

With the advent of Windows XP Service Pack 2, which enhances Microsoft's RPC security immensely, we...

Author: Microsoft Swiss Security Team Date: 09/16/2005

Companies urged to change their password policies

In today's security climate, passwords are apparently no longer enough to guarantee user...

Author: Microsoft Swiss Security Team Date: 09/16/2005

Keyboard acoustic emanations attack

[berkeley] We examine the problem of keyboard acoustic emanations. We present a novel attack taking...

Author: Microsoft Swiss Security Team Date: 09/16/2005

SONIA Incident Training

Urs seems to be so fast, that I have no way in catching up with his blogging. Anyway, there is...

Author: Microsoft Swiss Security Team Date: 09/15/2005

Welcome to the patterns & practices Security Wiki

Welcome to the patterns & practices Security Wiki! This is where we put our latest thoughts and...

Author: Microsoft Swiss Security Team Date: 09/15/2005

IE7: Hashes to the anti-fishing server? Why not!

[ptorr] Why not use hashes for the Anti-Phishing Filter? Several people have asked why Internet...

Author: Microsoft Swiss Security Team Date: 09/15/2005

Psst... wanna know a secret? 20 Things They Don't Want You to Know

Psssst! Wanna know a secret? How about a whole bunch of them? Insider tips will help you cut through...

Author: Microsoft Swiss Security Team Date: 09/12/2005

CISSP and (ISC)2

We just finished our CBK (Common Body of Knowledge) seminar, a one week training covering ten...

Author: Microsoft Swiss Security Team Date: 09/10/2005

Internet satellite imagery under fire over security

Asian governments have expressed security concerns about easy access to detailed satellite images on...

Author: Microsoft Swiss Security Team Date: 09/07/2005

A major Internet attack: 6 ways to survive

Facing the difficult task of securing systems, experts offer their advice. Given the increasing...

Author: Microsoft Swiss Security Team Date: 09/07/2005

Court Rules Against Kazaa

We know since quite a long time that often virus/trojan-infected files are distributed via...

Author: Microsoft Swiss Security Team Date: 09/06/2005

Ruthless Use of Katrina

This will be a pretty low-blog week as Urs and myself are attending a CISSP training.......

Author: Microsoft Swiss Security Team Date: 09/05/2005

Increase in Mobile Viruses

Vendors Claim Mobile Viruses Worsening. Two vendors of mobile anti-virus products made separate...

Author: Microsoft Swiss Security Team Date: 09/01/2005

Changes in Threats?

I have been at the Symposium on Privacy and Security today talking about security for small and...

Author: Microsoft Swiss Security Team Date: 08/31/2005

To SHA-1 or not to SHA-1

Three Chinese researchers have further refined an attack on the encryption standard frequently used...

Author: Microsoft Swiss Security Team Date: 08/31/2005

<Previous Next>