Microsoft BlueHat Blog
Search this blog
Search all blogs
View More Blogs
Microsoft Accessibility Blog
Microsoft BlueHat Blog
Microsoft Malware Protection Center Blog
Microsoft Security Blog
Microsoft Security Response Center Blog
Security Development Lifecycle Blog
Security Research & Defense Blog
Security Tips & Talk Blog
Trustworthy Computing Blog
Microsoft BlueHat Blog
internet explorer (ie)
BlueHat Security Briefings
Cloud Computing Privacy
Defend the Flag
End to End Trust
Internet Explorer (IE)
Malicious Software (Malware)
Microsoft Active Protections Program (MAPP)
Microsoft Vulnerability Research (MSVR)
MSRC Ecosystem Strategy
Security Conference Engagement
Security Development Lifecycle (SDL)
Security Intelligence Report
Browse by Tags
Tagged Content List
Filling A Gap In the Vulnerability Market – First Bounty Notification
When Microsoft decided to offer not one but three new bounties, paying outside researchers directly for security research on some of our latest products, we put a lot of thought into developing those bounty programs. We developed a customized set of programs designed to create a win-win between the security...
10 Jul 2013
New Bounty Programs – One Week In
Two weeks ago, Microsoft made an important evolutionary step in our work with the security community when we announced our first-ever bounty programs for security issues. One week ago, the Windows 8.1 Preview and Internet Explorer 11 Preview became available for download , and the doors officially opened...
3 Jul 2013
Doors Open for New Bounty Programs
As we announced last week , Microsoft is now offering $100,000 bounties for new exploitation techniques that can bypass our latest platform-wide defenses and up to $50,000 bonus bounties for defense ideas. We’re also offering (from now until July 26) bounties of up to $11,000 for critical security...
27 Jun 2013
Strengthening the Security Cooperation Program
Handle: Cap'n Steve IRL: Steve Adegbite Rank: Senior Security Program Manager Lead Likes: Reverse Engineering an obscene amount of code and ripping it up on a snowboard Dislikes: Not much but if you hear me growl…run G'day Mate! I have always wanted to say that. I am here at the...
18 May 2010
Hacker Olympics: a shout-out from Vancouver, BC!
Handle: Cluster IRL: Maarten Van Horenbeeck Rank: Senior Program Manager Likes: Slicing covert channels, foraging in remote memory pools, and setting off page faults Dislikes: The crackling sound of crypto breaking, warm vodka martni Handle: Mando Picker IRL: Dustin Childs ...
2 Apr 2010
Snowpacalypse Now (I love the smell of briefings in the morning)
Handle: Avatar IRL: Karl Hanmore Rank: Senior Security Strategist (aka Sergeant Grunt) Likes: Getting the job done, bringing the fight to the bad guys, good single malt whiskey Dislikes: Cowards, talkers not doers, red tape, humidity Handle: Mando Picker IRL: Dustin Childs ...
19 Feb 2010
Do you believe in ghosts?
When I was a kid, I had nightmares every week. I still remember some of them vividly, particularly the ones where ghosts were involved. Not the typical ghosts from the movies , but ones that could not be seen, only heard and felt. Why would I be so frightened and still remember them “vividly” today?...
16 Feb 2010
BlueHat Security Forum: Buenos Aires Edition
Handle: C-Lizzle IRL: Celene Temkin Rank: Program Manager 2 & BlueHat Project Manager Likes: Culinary warfare, BlueHat hackers and responsible disclosure Dislikes: Acts of hubris, MySpace, orange mocha Frappaccinos! Hey Everyone! What speaks English, Portuguese and Spanish, has a hundred...
11 Feb 2010
G’day mate, howsitgoing?
Handle: Avatar IRL: Karl Hanmore Rank: Senior Security Strategist (aka Sergeant Grunt) Likes: Getting the job done, bringing the fight to the bad guys, good single malt whiskey Dislikes: Cowards, talkers not doers, red tape, humidity G’day, or should I say howdy, y’all. As...
14 Dec 2009
Collaborating on RIA Security
Microsoft and Adobe frequently work together on security. At this year's BlueHat , we will come together to share our security research in the area of Rich Internet Applications (RIAs). While we independently place considerable thought and effort into our respective security models, attackers often look...
6 Oct 2009
Stainless steel bridge
Hi! Manuel Caballero here. I had the pleasure of penetration testing (pen-testing) the previous versions of Microsoft Silverlight, and now, for the last three weeks, I’ve been playing around with the beta version of Silverlight 3. When I say, "the pleasure", I really mean it. Playing with Silverlight...
15 Jun 2009
Dune Busting and Browser Fun at HITB – Dubai
Hi, Billy Rios here, I was recently invited to speak at Hack in the Box (HITB) in Dubai. While at HITB, I participated in two different talks, but I’m going to focus on the talk Chris Evans and I co-presented: “Cross Domain Leakiness.” Chris Evans is a security lead for Google’s Core Security team. Some...
13 May 2009
Page 1 of 1 (12 items)
© 2013 Microsoft Corporation.
Privacy & Cookies