See all products »
Curah! curation service
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Server and Tools Blogs
TechNet Flash Newsletter
Cloud and Datacenter
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Microsoft Download Center
TechNet Evaluation Center
Compatability & Converters
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Second shot for certification
Born To Learn blog
Find technical communities in your area
For small and midsize businesses
For IT professionals
For technical support
For home users
Microsoft Premier Online
Microsoft Fix It Center
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
The Fire Hose
Covering the news of the day at Microsoft
App of the Week
kinect for windows
National Retail Federation
Office Web Apps
On the Whiteboard
Staff App Picks
System Center 2012
Windows Embedded 8
Worldwide Partner Conference
Xbox LIVE Arcade
Browse by Tags
The Fire Hose
Life in the digital crosshairs: Experience the untold story
On Saturday, July 13, 2001, Microsoft was alerted to a nasty piece of malware called “Code Red.” In just two weeks, ABC News reported that the Code Red worm had infected more than 300,000 Windows computers around the world. When the news broke, it was like something straight out of a Tom...
5 Mar 2014
Needed: International convention on privacy and government access to data, says Microsoft exec
At Microsoft, establishing and sustaining trust with customers is essential, and with government access to data continuing to be a “hot topic,” Microsoft’s corporate vice president for Trustworthy Computing said Tuesday that one way to address the issue is to have an international convention...
26 Feb 2014
Microsoft security experts will speak at RSA Conference USA Feb. 24-28
The annual RSA Conference USA will be held Feb. 24-28 in San Francisco, bringing together many of the brightest minds in IT security. Microsoft is a conference sponsor, and its executives will deliver several of the speeches during the week, writes Jeff Jones, Trustworthy Computing director. Among...
19 Feb 2014
New security papers can help small businesses manage data better
To help more small and medium-sized businesses manage data better, Microsoft Trustworthy Computing has just released two papers that outline data classification processes and benefits. As the Trustworthy Computing blog reports, “ Data Classification for Cloud Readiness ” outlines the risks...
28 Jan 2014
Microsoft makes recommendations to Department of Defense about the role of international standards in Software Assurance
Microsoft filed comments last week with the U.S. Department of Defense in response to a request for information about Software Assurance practices and the governance of Software Assurance programs, writes Paul Nicholas, senior director of Global Security Strategy at Microsoft, on the Microsoft Security...
24 Jan 2014
New Year’s resolutions to make – and keep – for your digital devices and online life
You may be focusing on New Year’s resolutions about being fit, but there’s one more resolutions list to consider making, and that’s about security for your digital devices and your online life in 2014. On the Security Tips & Talk blog, Eve Blakemore offers 10 resolutions that...
31 Dec 2013
New version of Microsoft Security Intelligence Report app is available
The latest Microsoft Security Intelligence Report, volume 15, is available via a new version of the SIR app that runs on Windows 7- and Windows 8-based systems. The original app, launched a few months ago, was “designed to provide customers with an enhanced way to access the vast amount of threat...
20 Dec 2013
Top 2014 threats include sneakier social engineering, ransomware and World Cup-related cybercrime
Microsoft’s senior cybersecurity leaders share their predictions for the kinds of threats users could face in the year ahead, and there are some old enemies with new approaches to watch out for in 2014. Among the issues, as shared on the Microsoft Security Blog on Thursday: Social engineering...
12 Dec 2013
11 security bulletins issued on Update Tuesday
On Tuesday, Microsoft released 11 security bulletins, five which are rated critical for Internet Explorer, Windows and the Microsoft graphics component. Three security advisories and one updated security advisory were also issued. Dustin C. Childs of Microsoft Trustworthy Computing Group Manager,...
10 Dec 2013
September results shared for Microsoft malware protection, performance
Hundreds of millions of customers share real-world data about Microsoft’s protection performance and capabilities with the company, so that that information can ultimately be shared with everyone. The latest report, for September, is now out, posted by the Malware Protection Center Blog . Earlier...
28 Oct 2013
Is there such thing as a secure cloud? Microsoft’s Adrienne Hall offers guidance
At the GigaOM Structure: Europe conference in September, GigaOM PRO analyst Greg Ferro moderated a panel titled “ Mission Not So Impossible: A Truly Secure Cloud ?” Ferro said his position is that there is no such thing as a secure cloud. While it’s true that threats aren’t going...
1 Oct 2013
Microsoft report shows how the financial industry protects your sensitive information
You regularly change your passwords, you never open email you don’t recognize and you shoo away “ Nigerian princes .” Yet every day, you trust financial institutions with your money, your credit and your personal information. How does the financial industry, which handles trillions...
18 Sep 2013
How information security officers handle compliance in the cloud
The shift to cloud computing – and away from internally housed data and operations – poses new challenges for information security professionals. Compliance is one of them. On Monday, Microsoft Trustworthy Computing released “ CISO Perspectives: Compliance in the Cloud ,” a new...
10 Sep 2013
Deloitte, Cloud Security Alliance validate Windows Azure security measures
Microsoft takes its customers’ security seriously across all of our products. That is particularly true of our cloud services, so it’s always good to get validation from our industry partners and third-party organizations where security is concerned. “Deloitte recently completed...
22 Aug 2013
Phishing scam asks for credit card info to ‘unblock’ email
Unfortunately, scammers are creative and in seemingly endless supply. And Microsoft often hears of scammers trying to establish trust by using its name. Fortunately, a lot of savvy customers report these experiences. The Security Tips & Talk blog highlights a phishing scam that comes in the form...
2 Aug 2013
Can the cloud be secure? How Microsoft tackles the perpetual question
As consumers and organizations come to embrace the idea of cloud services, attention on the security of those services is growing. We hear about breaches in private, on-premise systems all the time. Can the cloud be secure? It’s an important consideration for all of us. “It’s a challenging...
2 Aug 2013
Latest Microsoft Security Response Center report now available
The latest Microsoft Security Response Center report covering July 2012 to June 2013 is now available for download . The report, which is released once per year by the MSRC, gives our customers insight into the progress of various security initiatives to foster deeper industry collaboration, increase...
29 Jul 2013
(Don’t) Meet the Ronvix: an evolved Trojan breed emerges
Microsoft’s Malware Protection Center today reports the discovery a new breed of the bootkit Ronvix. This Trojan makes changes to your computer so that it downloads and runs other malware every time it starts. The Malware Protection Center says this type of malware has become a new trend, wherein...
26 Jul 2013
When it comes to oil and gas industry software, safety is the name of the game
Over the years, the oil and gas industry has seen some highly publicized attacks. For an industry so critical to our everyday lives, application security is of paramount importance, writes Tim Rains, Microsoft’s director of Trustworthy Computing. This is precisely why Microsoft today released...
16 Jul 2013
Nearly half of developers skip security practices, study shows
You’re probably familiar with regular security updates from Microsoft and other companies whose products you use. There’s a reason for their frequency – security threats are constant and constantly evolve. Attempts to exploit vulnerabilities, trick users into installing malicious software...
15 Jul 2013
Microsoft study to reveal attitudes, perceptions around security and privacy
Microsoft Trustworthy Computing will release results of its new “Trust in Computing” research study this week. The Microsoft-commissioned survey aims to uncover current attitudes and perceptions related to security and privacy. The research touches on timely topics, including the impact of...
10 Jul 2013
Windows Phone 8 app delivers Microsoft security news
Want to know about the latest threat trends, security updates, mitigation tools, and tips from Microsoft security and privacy experts? You can get it all delivered right to your Windows Phone device with the TwC Blogs (Trustworthy Computing) app . Today, Microsoft Director of Trustworthy Computing Tim...
9 Jul 2013
Moving to the cloud? Trustworthy Computing offers resources to make sure you’re ready
Trustworthy Computing General Manager Adrienne Hall has put together a few resources for businesses and organizations looking to move their IT assets to the cloud in a safe and secure way. “First, the Cloud Security Alliance’s Security Guidance for Critical Areas of Focus in Cloud Computing...
9 Jul 2013
Attention, IT pros: Enhanced Mitigation Experience Toolkit (EMET) Version 4.0 now available
IT pros and developers now have another weapon in their arsenal to combat software vulnerabilities: a new version of our Enhanced Mitigation Experience Toolkit (EMET 4.0). “The tool works by protecting applications via the latest security mitigation technologies built into Windows, even in cases...
18 Jun 2013
Cloud services: Secure? Insecure? What’s the answer?
Microsoft recently commissioned a study of companies with 499 PCs or less in France, Germany, the United Kingdom and the U.S. that examined the security, reliability and privacy perceptions and realities of cloud services. “We spoke to equal numbers of companies that both use the cloud and do...
7 Jun 2013
© 2014 Microsoft Corporation.
Privacy & Cookies