Delen via


Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Windows Vista 64Bit non-signed driver install tool (atsiv) blocked

The third party kernel mode driver named “Atsiv” provides a mechanismto load code that conflicts...

Author: Microsoft Swiss Security Team Date: 08/13/2007

Hackers are giving up hacking

Hackers are increasingly giving up hacking, why? Because its become boring, there is no glits and...

Author: Microsoft Swiss Security Team Date: 07/27/2007

Animated film about malware and how to get hacked easely

This movie shows how easily you can be a victim of a hacker if you have not taken care of the proper...

Author: Microsoft Swiss Security Team Date: 07/27/2007

The Rise of Antiforensics

New, easy to use antiforensic tools make all data suspect, threatening to render computer...

Author: Microsoft Swiss Security Team Date: 07/27/2007

Windows Vista Integrity Mechanism - Technical Reference

Peter Brundrett, the Product Manager behind the integrity levels work in Windows Vista has written...

Author: Microsoft Swiss Security Team Date: 07/12/2007

Microsoft security threat and research portal

Microsoft now has its own security threat and research portal: We launched officially version 1 of...

Author: Microsoft Swiss Security Team Date: 07/12/2007

Meet the Next-Gen Web Worm

At the Black Hat conference next month, Hoffman and fellow researcher John Terrill will demonstrate...

Author: Microsoft Swiss Security Team Date: 07/12/2007

Vulnerability Auctions

A group of security professionals launched this week what they hope will become the eBay of security...

Author: Microsoft Swiss Security Team Date: 07/12/2007

Cyber crime on Second Life

As Second Life creators at LindenLab stated on SL homepage: "there are as many opportunities for...

Author: Microsoft Swiss Security Team Date: 07/04/2007

Malware finds a new home

In many cases, mass-mailing malware is now inefficient due to better protection mechanism and the...

Author: Microsoft Swiss Security Team Date: 07/04/2007

Exploring The Windows Firewall

Mobility has changed computer threats and the techniques that guard against them. As laptops wander...

Author: Microsoft Swiss Security Team Date: 06/30/2007

Keys to Protecting Data with BitLocker Drive Encryption

BitLocker serves two very important purposes: it provides both full-volume data encryption and a way...

Author: Microsoft Swiss Security Team Date: 06/30/2007

Take a Tour Through the Features and User Interface of Forefront Client Security

Microsoft Forefront Client Security provides three important functions: protection, control, and...

Author: Microsoft Swiss Security Team Date: 06/30/2007

The Struggle to Protect Enterprise Data

The problem of enterprise data protection is so big, companies have just begun wrapping their arms...

Author: Microsoft Swiss Security Team Date: 06/30/2007

Inside Windows Vista User Account Control

User Account Control (UAC) is an often misunderstood feature in Windows Vista, see online article by...

Author: Microsoft Swiss Security Team Date: 06/28/2007

Multiple password policies in Active Directory

With Windows Server 2008 ("Longhorn"), it will be possible for the first time to have different...

Author: Microsoft Swiss Security Team Date: 06/28/2007

The new Advanced Group Policy Management (AGPM)

The new Advanced Group Policy Management (AGPM) tool from Microsoft, by Derek Melber....

Author: Microsoft Swiss Security Team Date: 06/28/2007

Profiling an Operating System

Very interesting online article about the profiling of an opearing system....

Author: Microsoft Swiss Security Team Date: 06/28/2007

How Software is Built - Interview with Michael Howard

How Software is Built - Interview with Michael Howard, senior security program manager in the...

Author: Microsoft Swiss Security Team Date: 06/28/2007

DNS Publishing Scenarios (with ISA Server)

DNS issues come up quite a bit on web boards and mailing list. Recently there have been a flurry of...

Author: Microsoft Swiss Security Team Date: 06/28/2007

A push to standards for network forensics

A push to standards for network forensicsBy Beth Rosenberg, Network World, 06/20/07 Digital...

Author: Microsoft Swiss Security Team Date: 06/21/2007

Cybersecurity standards developments guidance to cybersecurity architects

New online tool charts cybersecurity standards developments essential guidance to cybersecurity...

Author: Microsoft Swiss Security Team Date: 06/21/2007

Uncover security design flaws using the STRIDE approach

The Security Development Lifecycle (SDL) threat modeling process has evolved over the last few years...

Author: Microsoft Swiss Security Team Date: 06/21/2007

Windows Live ID vulnerability (comments and status)

Microsoft has become aware of a bug in the e-mail verification portion of the registration process...

Author: Microsoft Swiss Security Team Date: 06/21/2007

Security Tip: Read the EULA… No, Really Read It! ;-)

Data protection policies need to be well thought out and consider not only the systems in direct...

Author: Microsoft Swiss Security Team Date: 06/16/2007

Privacy resources update

Privacy Guidelines for Developing Software Products and ServicesIn response to requests from...

Author: Microsoft Swiss Security Team Date: 06/16/2007

Data Encryption Toolkit for Mobile PCs

The Data Encryption Toolkit for Mobile PCs provides tested guidance and powerful tools to help...

Author: Microsoft Swiss Security Team Date: 06/16/2007

A good overview of information warfare:https://www.fas.org/irp/crs/RL31787.pdf Urs

Author: Microsoft Swiss Security Team Date: 06/15/2007

Spammers establishing use of artificial intelligence

Though security industry experts were freely predicting the death of spam several years ago, the...

Author: Microsoft Swiss Security Team Date: 06/15/2007

Forefront Next Generation - "Stirling"

As I have mentioned in a blog entry yesterday, we have officially launched the Forefront and System...

Author: Microsoft Swiss Security Team Date: 06/14/2007

Microsoft Security Intelligence Report (H2 2006)

We published the second Security Intelligence Report. Now, you might ask, why this is significant....

Author: Microsoft Swiss Security Team Date: 06/14/2007

Microsoft Malware Protection Portal (preview)

We have released a preview of our Malware Protection Portal, which will go live this summer.You can...

Author: Microsoft Swiss Security Team Date: 06/14/2007

The Bluetooth Keyboard Mystery: Solved. - Michael Howard [FUN]

In a IT world, it's not the gardener, it's the cleaner!!! Once again... Funny story about a...

Author: Microsoft Swiss Security Team Date: 06/14/2007

Launch of Microsoft Forefront and Systemcenter in Switzerland

Take control! We have yesterday officially launched the Microsoft Forefront and the Microsoft System...

Author: Microsoft Swiss Security Team Date: 06/14/2007

Operation BOTROAST - Over 1 Million Potential Victims of Botnet Cyber Crime

Today the Department of Justice and FBI announced the results of an ongoing cyber crime initiative...

Author: Microsoft Swiss Security Team Date: 06/14/2007

Windows Server 2003 and Windows XP: CC EAL4 achieved

The validation for the two products are finished and we got the EAL4 certification from Common...

Author: Microsoft Swiss Security Team Date: 06/08/2007

Security Development Lifecycle (SDL) Blog online

The security engineering team at Microsoft startet a new blog around the SDL! If you're interested,...

Author: Microsoft Swiss Security Team Date: 05/07/2007

Microsoft Touts Trust-Based ID

About the future of Active Directory and Federation Services: "Microsoft recently laid out a future...

Author: Microsoft Swiss Security Team Date: 05/04/2007

How to get a password? Just ask...

Network managers are fighting a lonely battle on security with the majority of users and directors...

Author: Microsoft Swiss Security Team Date: 04/24/2007

Top ten Internet crimes 2006 (Internet Crime Report 2006)

I really can't believe that there are still people who get trapped by those Nigerian fraud letter......

Author: Microsoft Swiss Security Team Date: 04/24/2007

Computer Forensic Software Tools Downloads

Software tools that have been found to be useful in forensic examination of recovered evidence....

Author: Microsoft Swiss Security Team Date: 04/19/2007

Data Encryption Toolkit for Mobile PCs - Security Analysis

This guide, the Microsoft Data Encryption Toolkit for Mobile PCs Security Analysis, provides...

Author: Microsoft Swiss Security Team Date: 04/11/2007

NIST Releases Report on Biometrics Advances

Improved algorithms used in facial recognition software programs have improved the success of such...

Author: Microsoft Swiss Security Team Date: 04/11/2007

Hotfix4Hotfix (MS07-017/KB925902) Update

The out-of band hotfix has created problems in combination with the RealTek Soundchip and some other...

Author: Microsoft Swiss Security Team Date: 04/07/2007

An inside look into building and releasing MS07-017

Mike Reavey from MSRC on the history of...

Author: Microsoft Swiss Security Team Date: 04/05/2007

Out of band patch release on April, 3rd. 2007

As you probably have seen this allready, as a reminder: On 03 April 2007 Microsoft is planning to...

Author: Microsoft Swiss Security Team Date: 04/02/2007

SPAM mail from admin@microsoft.com

We got an increase on helpdesk calls in different subsidiaries with regards to a mail that is...

Author: Microsoft Swiss Security Team Date: 04/02/2007

Windows Vista - 90-days vulnerability report

February 28th marked 90 days that Windows Vista had been available to business customers. December...

Author: Microsoft Swiss Security Team Date: 03/25/2007

<Previous Next>