Microsoft® Phishing Filter Add-in for MSN® Search Toolbar (Beta) Dynamic Service Helps Protect Against Fraudulent Websites and Personal Data Theft
Phishing (pronounced "Fishing") is one of the fastest growing threats on the Internet and a form of identity theft. It refers to high-tech scams using phony web sites with actual brands designed to steal valuable personal information such as usernames, passwords, credit card numbers, and Social Security numbers.
Phishers use many tactics including creating and sending links to fraudulent Web sites or e-mail messages that appear to be valid in an attempt to fool you into submitting personal, financial, and password information. Often an e-mail will be sent containing a link taking you to a fraudulent Web site appearing to be valid (like your bank or mortgage company) so that you'll enter your personal information. By using well-known, trusted brand names and logos, phishers are able to convince you to respond to them.
The Phishing Filter Add-in offers access to the beta version of a new dynamic online service, updated several times an hour to warn you and help protect your personal information from these fraudulent websites by:
http://addins.msn.com/phishingfilter/
Urs
We get a lot of questions about MS05-051 and whether there are issues with this Update. Yes, we know about isolatied problems and documented them in a knowledgebase article: http://www.microsoft.com/technet/security/advisory/909444.mspx
I would like to mention that this is a critical update, which should be deployed immediatly if you have not already done so. It could lead to a major attack on the Internet
Roger
I know that I am just repeating myself - but during the ITPro/Partner Roadshow, I have been asked whether there is an easy way to get a quick assessment of a company's state regarding security. Yes, there is a really easy way: It is called Microsoft Security Risk Self-Assessment Tool (cool, isn't it?) and can be downloaded for free at http://www.securityguidance.com/
Microsoft is joining with Motorola in an alliance to improve software applications for public safety and criminal justice customers, the companies said Tuesday. The alliance will build on several Microsoft products including its .NET framework and its Windows Server System while Motorola will utilize its NetRMS Records Management System and its Motorola Computer Aided Dispatch Software. “These applications,” they said in a statement, “are aimed at increasing the quality of information available to first responders, … automating the mission-critical functions for a single- or multi-agency and multi-jurisdictional public safety agency.” Motorola said it will develop the applications using Visual Studio and .NET 2003. The Windows Server System software it will employ includes Microsoft SQL Server and Microsoft Biz Talk Server.
http://www.securitypipeline.com/news/171202933; jsessionid=V3IVZZS35VKIAQSNDBCSKH0CJUMEKJVN
Well, I know that two posts area a lot per day but this is too important to omit.
Since months I have been asked about the future of our Anti-Spyware solution and what we do with regards to Anti-Virus. Well, now it is out: It is called Microsoft Client Protection and will combine Anti-Spyware and Anti-Virus. If you are interested to read more, go to:
Microsoft Security Strategy: http://www.microsoft.com/presspass/press/2005/oct05/10-06SecuritySpeechPR.mspx
Microsoft Client Protection: http://www.microsoft.com/presspass/features/2005/oct05/10-06ClientProtection.mspx
It is amazing to see that we are getting positive feedback for our security efforts. We showed Beta2 of Internet Explorer 7 at the Hack in a Box conference in Kuala Lumpur and it seems that the Security Research Community is pretty impressed from what they saw. Read more: http://www.infoworld.com/article/05/09/29/HNhackerfeedback_1.html
I happened to see the way IE 7 is built and the technology behind this. I am really looking forward to the release…
It is definitely not new but from time to time information leaks thorugh the improper use of the "Track Changes" functionality in Word. But it time it is pretty havy - this time we are talking of a summary of the report written by Detelv Mehlis, the German proescutor heading up for the Hariri-case. If you want to see the whole story: http://www.gcn.com/vol1_no1/daily-updates/37416-1.html
If you want to avoid such kind of leakage, please see the KB about How to minimize Metadata in Office Documents on http://support.microsoft.com/kb/223396/ and check the Remove Hidden Data tool on http://support.microsoft.com/default.aspx?scid=kb;en-us;834427
There are many different types of bluetooth devices like mobile phones, PDAs or printers which provide many different services. Each manufacturer has a different view of security which leaves us in a great field of different security vulnerabilitys on wireless devices. This site is dedicated to change this in that form that it trys to provide a database with all needed information like manufacturer/device/revision/services/security_measures. Also the project trys to provide a list of security testing/analysis software special for bluetooth devices, this also includes proofs of concept implementations for discovered vulnerabilitys to show that a particular threat really is exploitable.
http://www.betaversion.net/btdsd/
At the moment we are running our ITPro/Partenr Roadshow throughout Switzerland. During my seucrity speaches I often talk about the fact that organized crime is using the internet.
Today I foudn an article on the net just underlining this: A security expert from IBM has controversially suggested a number of large companies are still "more often than not" paying off cyber criminals threatening them with distributed denial-of-service attacks.
Read more: http://software.silicon.com/security/0,39024655,39153081,00.htm
The idea behind SVV is to check important Windows System components, which are usually altered by various stealth malware, in order to ensure system integrity and to discovery potential system compromise.
http://www.rootkit.com/newsread.php?newsid=357
What a name! ;-) However, some sources claim that this tool is also capable to detect also certain rootkits.
Since weeks now we hear a lot of chatter about attacks on the October security updates. It is true that there are several Exploits and Proof of Concepts available. Bur looking at all the messages we see on the net, I think that you have to be extremely careful. Most of the messages are wrong and have to be withdrawn hours after they have been published.
Therefore – I think the safest way to address this is now to roll out the security updates.
ISA Server 2004 Microsoft Internet Security and Acceleration (ISA) Server has achieved CC Evaluation Assurance Level 4+ (EAL 4+). Level 4 is the highest level possible that is mutually recognized by all countries participating in CC certification. This level provides the deepest evaluation and testing possible from an independent testing laboratory. In addition, ISA Server passed an even more thorough review, earning Level 4+. You can find the supporting resources and documentation on this page. This CC certificate assures you that the evaluated security features of ISA Server Standard Edition are effective and implemented correctly.
http://www.microsoft.com/isaserver/techinfo/deployment/commoncrit.mspx
Great news! Found that information almost by accident... ;-)Urs
The Microsoft Windows NT 4.0 and Windows 98 Threat Mitigation Guide describes the process of hardening networks and computers that run earlier versions of the Windows operating system. Organizations may have a variety of combinations of computers running Windows NT 4.0 (Workstation, Server, and Advanced Server) and Windows 98, with or without later versions of Windows clients or servers. This guidance focuses on the protective measures that can be applied to Windows NT 4.0 Workstation and Windows 98 clients and Windows NT 4.0 member servers in an Active Directory directory service domain environment to improve their security.
http://www.microsoft.com/technet/ security/topics/networksecurity/threatmi.mspx
I wasn't sure if its a good idea to post this link - it's about (very, very, very) old (and I mean very old) operating systems! However, there are still some of those arround - probably it's better to help improve the usage of those outdated operating system, then to do nothing at all... ;-)
Have you ever wondered how you could reduce the privileges a browser (I mean any browser) has in order to do safer browsing? There is an easy option written by Michael Howard. You can look at the description of the tool as well as download the tool at: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dncode/html/secure11152004.asp.
Additionally there is a description of the tool at Reducing Browser Privileges: http://online.securityfocus.com/infocus/1848
Have fun
http://www.brightfeetslippers.com/
This seems to be a great success in the fight against botnets:
In the Netherlands a botnet with more than 100'000 bots has been taken down and there is already a suspect.
Read more: http://www.om.nl/?s=3&p=lp&id=5146
Yesterday we released a few patches. We are convinced that you have good information about the patches themselves. But what about the days after? Did you ever want to ask us questions after the first tests or after the first rumours appearing on the Internet?
Well, from now on we will offer you a service: We will be available on an online chat to answer your questions about patches (if possible) and about the recent security webcasts. If you are interested, go to this link and join us on Friday 9:00 – 10:00: http://www.microsoft.com/switzerland/technet/de/program/webcasts.mspx
Looking forward to chatting with you