Microsoft Switzerland Security Blog
Security informations brought to you by the Swiss Security Team.
Windows Vista 64Bit non-signed driver install tool (atsiv) blocked
The third party kernel mode driver named “Atsiv” provides a mechanismto load code that conflicts...
Author: Microsoft Swiss Security Team Date: 08/13/2007
Hackers are giving up hacking
Hackers are increasingly giving up hacking, why? Because its become boring, there is no glits and...
Author: Microsoft Swiss Security Team Date: 07/27/2007
Animated film about malware and how to get hacked easely
This movie shows how easily you can be a victim of a hacker if you have not taken care of the proper...
Author: Microsoft Swiss Security Team Date: 07/27/2007
The Rise of Antiforensics
New, easy to use antiforensic tools make all data suspect, threatening to render computer...
Author: Microsoft Swiss Security Team Date: 07/27/2007
Windows Vista Integrity Mechanism - Technical Reference
Peter Brundrett, the Product Manager behind the integrity levels work in Windows Vista has written...
Author: Microsoft Swiss Security Team Date: 07/12/2007
Microsoft security threat and research portal
Microsoft now has its own security threat and research portal: We launched officially version 1 of...
Author: Microsoft Swiss Security Team Date: 07/12/2007
Meet the Next-Gen Web Worm
At the Black Hat conference next month, Hoffman and fellow researcher John Terrill will demonstrate...
Author: Microsoft Swiss Security Team Date: 07/12/2007
Vulnerability Auctions
A group of security professionals launched this week what they hope will become the eBay of security...
Author: Microsoft Swiss Security Team Date: 07/12/2007
Cyber crime on Second Life
As Second Life creators at LindenLab stated on SL homepage: "there are as many opportunities for...
Author: Microsoft Swiss Security Team Date: 07/04/2007
Malware finds a new home
In many cases, mass-mailing malware is now inefficient due to better protection mechanism and the...
Author: Microsoft Swiss Security Team Date: 07/04/2007
Exploring The Windows Firewall
Mobility has changed computer threats and the techniques that guard against them. As laptops wander...
Author: Microsoft Swiss Security Team Date: 06/30/2007
Keys to Protecting Data with BitLocker Drive Encryption
BitLocker serves two very important purposes: it provides both full-volume data encryption and a way...
Author: Microsoft Swiss Security Team Date: 06/30/2007
Take a Tour Through the Features and User Interface of Forefront Client Security
Microsoft Forefront Client Security provides three important functions: protection, control, and...
Author: Microsoft Swiss Security Team Date: 06/30/2007
The Struggle to Protect Enterprise Data
The problem of enterprise data protection is so big, companies have just begun wrapping their arms...
Author: Microsoft Swiss Security Team Date: 06/30/2007
Inside Windows Vista User Account Control
User Account Control (UAC) is an often misunderstood feature in Windows Vista, see online article by...
Author: Microsoft Swiss Security Team Date: 06/28/2007
Multiple password policies in Active Directory
With Windows Server 2008 ("Longhorn"), it will be possible for the first time to have different...
Author: Microsoft Swiss Security Team Date: 06/28/2007
The new Advanced Group Policy Management (AGPM)
The new Advanced Group Policy Management (AGPM) tool from Microsoft, by Derek Melber....
Author: Microsoft Swiss Security Team Date: 06/28/2007
Profiling an Operating System
Very interesting online article about the profiling of an opearing system....
Author: Microsoft Swiss Security Team Date: 06/28/2007
How Software is Built - Interview with Michael Howard
How Software is Built - Interview with Michael Howard, senior security program manager in the...
Author: Microsoft Swiss Security Team Date: 06/28/2007
DNS Publishing Scenarios (with ISA Server)
DNS issues come up quite a bit on web boards and mailing list. Recently there have been a flurry of...
Author: Microsoft Swiss Security Team Date: 06/28/2007
A push to standards for network forensics
A push to standards for network forensicsBy Beth Rosenberg, Network World, 06/20/07 Digital...
Author: Microsoft Swiss Security Team Date: 06/21/2007
Cybersecurity standards developments guidance to cybersecurity architects
New online tool charts cybersecurity standards developments essential guidance to cybersecurity...
Author: Microsoft Swiss Security Team Date: 06/21/2007
Uncover security design flaws using the STRIDE approach
The Security Development Lifecycle (SDL) threat modeling process has evolved over the last few years...
Author: Microsoft Swiss Security Team Date: 06/21/2007
Windows Live ID vulnerability (comments and status)
Microsoft has become aware of a bug in the e-mail verification portion of the registration process...
Author: Microsoft Swiss Security Team Date: 06/21/2007
Security Tip: Read the EULA… No, Really Read It! ;-)
Data protection policies need to be well thought out and consider not only the systems in direct...
Author: Microsoft Swiss Security Team Date: 06/16/2007
Privacy resources update
Privacy Guidelines for Developing Software Products and ServicesIn response to requests from...
Author: Microsoft Swiss Security Team Date: 06/16/2007
Data Encryption Toolkit for Mobile PCs
The Data Encryption Toolkit for Mobile PCs provides tested guidance and powerful tools to help...
Author: Microsoft Swiss Security Team Date: 06/16/2007
Information Operations and Cyberwar: Capabilities and Related Policy Issues
A good overview of information warfare:https://www.fas.org/irp/crs/RL31787.pdf Urs
Author: Microsoft Swiss Security Team Date: 06/15/2007
Spammers establishing use of artificial intelligence
Though security industry experts were freely predicting the death of spam several years ago, the...
Author: Microsoft Swiss Security Team Date: 06/15/2007
Forefront Next Generation - "Stirling"
As I have mentioned in a blog entry yesterday, we have officially launched the Forefront and System...
Author: Microsoft Swiss Security Team Date: 06/14/2007
Microsoft Security Intelligence Report (H2 2006)
We published the second Security Intelligence Report. Now, you might ask, why this is significant....
Author: Microsoft Swiss Security Team Date: 06/14/2007
Microsoft Malware Protection Portal (preview)
We have released a preview of our Malware Protection Portal, which will go live this summer.You can...
Author: Microsoft Swiss Security Team Date: 06/14/2007
The Bluetooth Keyboard Mystery: Solved. - Michael Howard [FUN]
In a IT world, it's not the gardener, it's the cleaner!!! Once again... Funny story about a...
Author: Microsoft Swiss Security Team Date: 06/14/2007
Launch of Microsoft Forefront and Systemcenter in Switzerland
Take control! We have yesterday officially launched the Microsoft Forefront and the Microsoft System...
Author: Microsoft Swiss Security Team Date: 06/14/2007
Operation BOTROAST - Over 1 Million Potential Victims of Botnet Cyber Crime
Today the Department of Justice and FBI announced the results of an ongoing cyber crime initiative...
Author: Microsoft Swiss Security Team Date: 06/14/2007
Windows Server 2003 and Windows XP: CC EAL4 achieved
The validation for the two products are finished and we got the EAL4 certification from Common...
Author: Microsoft Swiss Security Team Date: 06/08/2007
Security Development Lifecycle (SDL) Blog online
The security engineering team at Microsoft startet a new blog around the SDL! If you're interested,...
Author: Microsoft Swiss Security Team Date: 05/07/2007
Microsoft Touts Trust-Based ID
About the future of Active Directory and Federation Services: "Microsoft recently laid out a future...
Author: Microsoft Swiss Security Team Date: 05/04/2007
How to get a password? Just ask...
Network managers are fighting a lonely battle on security with the majority of users and directors...
Author: Microsoft Swiss Security Team Date: 04/24/2007
Top ten Internet crimes 2006 (Internet Crime Report 2006)
I really can't believe that there are still people who get trapped by those Nigerian fraud letter......
Author: Microsoft Swiss Security Team Date: 04/24/2007
Computer Forensic Software Tools Downloads
Software tools that have been found to be useful in forensic examination of recovered evidence....
Author: Microsoft Swiss Security Team Date: 04/19/2007
Data Encryption Toolkit for Mobile PCs - Security Analysis
This guide, the Microsoft Data Encryption Toolkit for Mobile PCs Security Analysis, provides...
Author: Microsoft Swiss Security Team Date: 04/11/2007
NIST Releases Report on Biometrics Advances
Improved algorithms used in facial recognition software programs have improved the success of such...
Author: Microsoft Swiss Security Team Date: 04/11/2007
Hotfix4Hotfix (MS07-017/KB925902) Update
The out-of band hotfix has created problems in combination with the RealTek Soundchip and some other...
Author: Microsoft Swiss Security Team Date: 04/07/2007
An inside look into building and releasing MS07-017
Mike Reavey from MSRC on the history of...
Author: Microsoft Swiss Security Team Date: 04/05/2007
Out of band patch release on April, 3rd. 2007
As you probably have seen this allready, as a reminder: On 03 April 2007 Microsoft is planning to...
Author: Microsoft Swiss Security Team Date: 04/02/2007
SPAM mail from admin@microsoft.com
We got an increase on helpdesk calls in different subsidiaries with regards to a mail that is...
Author: Microsoft Swiss Security Team Date: 04/02/2007
Windows Vista - 90-days vulnerability report
February 28th marked 90 days that Windows Vista had been available to business customers. December...
Author: Microsoft Swiss Security Team Date: 03/25/2007