Microsoft Switzerland Security Blog
Security informations brought to you by the Swiss Security Team.
Exchange Server 2003 Common Criteria Certification
Microsoft is deeply committed to optimizing the security of its products and services. As part of...
Author: Microsoft Swiss Security Team Date: 11/18/2005
VoIP Security Whitepaper
Nothing extremely urgent but extremely interesting: The BSI (Bundesamt für Sicherheit in der...
Author: Microsoft Swiss Security Team Date: 11/14/2005
Sony's DRM to be removed by Microsoft Anti-Spyware
We haven been asked frequently whether our Anti-Spyware solution will detect and remove the Sony...
Author: Microsoft Swiss Security Team Date: 11/13/2005
First backdoor (bot) uses Sony DRM software to hide
Breplibot.b is a backdoor with bot capabilities. It connects to several IRC servers and waits for...
Author: Microsoft Swiss Security Team Date: 11/11/2005
Microsoft Security Advisory: Macromedia Flash Player Vulnerabilities
Microsoft released a security Advisory on recent security vulnerabilities in Macromedia Flash...
Author: Microsoft Swiss Security Team Date: 11/11/2005
Hidden Administrator Accounts with No Passwords on Sony Vaio?
If this article is actually true, then the Sony setup creates under certain circumstances a hidden...
Author: Microsoft Swiss Security Team Date: 11/08/2005
Announcing Windows Defender!
From the product team directly: Every week seems like a big week for us in the engineering team...
Author: Microsoft Swiss Security Team Date: 11/07/2005
Security goes "Life"
You probably saw our recent announcements about Windows Life and Office Life. As part of Windows...
Author: Microsoft Swiss Security Team Date: 11/03/2005
The dark side of the force: Rootkits to enforce DRM!
Some DRM systems have started to use rootkit technology. Rootkits are normally associated with...
Author: Microsoft Swiss Security Team Date: 11/02/2005
When do we see the first automated IM worm?
Bascially there are two attack vectors that have not yet been exploited heavily: Mobile Devices and...
Author: Microsoft Swiss Security Team Date: 11/02/2005
"Track Changes" Reveals Sensitive Information at UN
It is definitely not new but from time to time information leaks thorugh the improper use of the...
Author: Microsoft Swiss Security Team Date: 10/27/2005
Chatter about Attacks on October Updates
Since weeks now we hear a lot of chatter about attacks on the October security updates. It is true...
Author: Microsoft Swiss Security Team Date: 10/25/2005
Microsoft Phishing Filter Add-in for MSN Search Toolbar (Beta)
Microsoft® Phishing Filter Add-in for MSN® Search Toolbar (Beta) Dynamic Service Helps Protect...
Author: Microsoft Swiss Security Team Date: 10/22/2005
Issues with MS05-051
We get a lot of questions about MS05-051 and whether there are issues with this Update. Yes, we know...
Author: Microsoft Swiss Security Team Date: 10/19/2005
Reducing the Risk of Browsing
Have you ever wondered how you could reduce the privileges a browser (I mean any browser) has in...
Author: Microsoft Swiss Security Team Date: 10/19/2005
Security Self-Assessment Tool for Midsized Companies
I know that I am just repeating myself - but during the ITPro/Partner Roadshow, I have been asked...
Author: Microsoft Swiss Security Team Date: 10/14/2005
Questions about our Patches?
Yesterday we released a few patches. We are convinced that you have good information about the...
Author: Microsoft Swiss Security Team Date: 10/12/2005
Large Botnet taken down
This seems to be a great success in the fight against botnets: In the Netherlands a botnet with more...
Author: Microsoft Swiss Security Team Date: 10/11/2005
Microsoft Client Protection
Well, I know that two posts area a lot per day but this is too important to omit. Since months I...
Author: Microsoft Swiss Security Team Date: 10/06/2005
Are online firms doing secret deals with DDoS attackers?
At the moment we are running our ITPro/Partenr Roadshow throughout Switzerland. During my seucrity...
Author: Microsoft Swiss Security Team Date: 10/06/2005
Windows NT 4.0 and Windows 98 Threat Mitigation Guide
The Microsoft Windows NT 4.0 and Windows 98 Threat Mitigation Guide describes the process of...
Author: Microsoft Swiss Security Team Date: 10/05/2005
Microsoft, Motorola Team On Public Safety Software
Microsoft is joining with Motorola in an alliance to improve software applications for public safety...
Author: Microsoft Swiss Security Team Date: 10/05/2005
System Virginity Verifier
The idea behind SVV is to check important Windows System components, which are usually altered by...
Author: Microsoft Swiss Security Team Date: 10/05/2005
Night Time Just Got a Little Brighter!
Now you can easily move handsfree around a darkened house reducing the risk of tripping over objects...
Author: Microsoft Swiss Security Team Date: 10/04/2005
Bluetooth device security database
There are many different types of bluetooth devices like mobile phones, PDAs or printers which...
Author: Microsoft Swiss Security Team Date: 10/04/2005
IE 7 gets good feedback at "Hack in a Box"
It is amazing to see that we are getting positive feedback for our security efforts. We showed Beta2...
Author: Microsoft Swiss Security Team Date: 10/03/2005
Online Lecture - Ross Anderson: Information Hiding
Over the last five years, techniques for hiding information have become a rapidly growing research...
Author: Microsoft Swiss Security Team Date: 09/27/2005
Privacy: Google's power makes security officials nervous
Google's power makes security officials nervous. Google has fast become the Internet search engine...
Author: Microsoft Swiss Security Team Date: 09/27/2005
A week in Redmond
During the last week, I have been on the Microsoft Campus in Redmond. We had the Quarterly Meeting...
Author: Microsoft Swiss Security Team Date: 09/24/2005
Organisations need a digital evidence plan
Businesses could lose legal disputes and miss out on insurance claims because of their inability to...
Author: Microsoft Swiss Security Team Date: 09/23/2005
NSA granted Net location-tracking patent
The National Security Agency has obtained a patent on a method of figuring out an Internet user's...
Author: Microsoft Swiss Security Team Date: 09/23/2005
Is the Firefox honeymoon over?
Firefox not only has more vulnerabilities per month than Internet Explorer, but it is now surpassing...
Author: Microsoft Swiss Security Team Date: 09/21/2005
Shared Computer Toolkit
Have you ever had the taks to setup a computer that is used by several "public" users? Like at...
Author: Microsoft Swiss Security Team Date: 09/20/2005
Microsoft aquired Alacris
Since quite some time we are working with Alacris on PKI projects. Alacris' idNexus was always a...
Author: Microsoft Swiss Security Team Date: 09/19/2005
Beyond "Blaster" - MSRPC Evasions
With the advent of Windows XP Service Pack 2, which enhances Microsoft's RPC security immensely, we...
Author: Microsoft Swiss Security Team Date: 09/16/2005
Companies urged to change their password policies
In today's security climate, passwords are apparently no longer enough to guarantee user...
Author: Microsoft Swiss Security Team Date: 09/16/2005
Keyboard acoustic emanations attack
[berkeley] We examine the problem of keyboard acoustic emanations. We present a novel attack taking...
Author: Microsoft Swiss Security Team Date: 09/16/2005
SONIA Incident Training
Urs seems to be so fast, that I have no way in catching up with his blogging. Anyway, there is...
Author: Microsoft Swiss Security Team Date: 09/15/2005
Welcome to the patterns & practices Security Wiki
Welcome to the patterns & practices Security Wiki! This is where we put our latest thoughts and...
Author: Microsoft Swiss Security Team Date: 09/15/2005
IE7: Hashes to the anti-fishing server? Why not!
[ptorr] Why not use hashes for the Anti-Phishing Filter? Several people have asked why Internet...
Author: Microsoft Swiss Security Team Date: 09/15/2005
Psst... wanna know a secret? 20 Things They Don't Want You to Know
Psssst! Wanna know a secret? How about a whole bunch of them? Insider tips will help you cut through...
Author: Microsoft Swiss Security Team Date: 09/12/2005
CISSP and (ISC)2
We just finished our CBK (Common Body of Knowledge) seminar, a one week training covering ten...
Author: Microsoft Swiss Security Team Date: 09/10/2005
Internet satellite imagery under fire over security
Asian governments have expressed security concerns about easy access to detailed satellite images on...
Author: Microsoft Swiss Security Team Date: 09/07/2005
A major Internet attack: 6 ways to survive
Facing the difficult task of securing systems, experts offer their advice. Given the increasing...
Author: Microsoft Swiss Security Team Date: 09/07/2005
Court Rules Against Kazaa
We know since quite a long time that often virus/trojan-infected files are distributed via...
Author: Microsoft Swiss Security Team Date: 09/06/2005
Ruthless Use of Katrina
This will be a pretty low-blog week as Urs and myself are attending a CISSP training.......
Author: Microsoft Swiss Security Team Date: 09/05/2005
Increase in Mobile Viruses
Vendors Claim Mobile Viruses Worsening. Two vendors of mobile anti-virus products made separate...
Author: Microsoft Swiss Security Team Date: 09/01/2005
Changes in Threats?
I have been at the Symposium on Privacy and Security today talking about security for small and...
Author: Microsoft Swiss Security Team Date: 08/31/2005
To SHA-1 or not to SHA-1
Three Chinese researchers have further refined an attack on the encryption standard frequently used...
Author: Microsoft Swiss Security Team Date: 08/31/2005