Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

July, 2007

  • Malware finds a new home

    In many cases, mass-mailing malware is now inefficient due to better protection mechanism and the noise it generates as it traverses the Internet. Sure, targeted e-mail attacks will continue. But compromised Web pages are now rapidly emerging as the replacement...
  • Cyber crime on Second Life

    As Second Life creators at LindenLab stated on SL homepage: "there are as many opportunities for innovation and profit in Second Life as in the Real World. Unfortunately, for any virtual or real occasion to make money, there is a criminal looking for...
  • Vulnerability Auctions

    A group of security professionals launched this week what they hope will become the eBay of security research. The Swiss-registered company, WSLabi, boasts that its online portal will allow researchers to sell vulnerabilities they have discovered to software...
  • Meet the Next-Gen Web Worm

    At the Black Hat conference next month, Hoffman and fellow researcher John Terrill will demonstrate their wily, next-generation Web worm in a session entitled "The Little Hybrid Web Worm that Could." Their new worm mutates to evade signature detection...
  • Microsoft security threat and research portal

    Microsoft now has its own security threat and research portal: We launched officially version 1 of the new Malware Protection Center Portal. The portal -- which Microsoft has been testing since April -- contains threat data, security research resources...
  • Windows Vista Integrity Mechanism - Technical Reference

    Peter Brundrett, the Product Manager behind the integrity levels work in Windows Vista has written some very detailed whitepapers: High-level background information about how Windows security works Detailed step-by-step content for designing...
  • The Rise of Antiforensics

    New, easy to use antiforensic tools make all data suspect, threatening to render computer investigations cost-prohibitive and legally irrelevant. http://whitehatsec.com/home/resources/trade/07tradenews/062607CSO.html See also: http://ws.hackaholic...
  • Animated film about malware and how to get hacked easely

    This movie shows how easily you can be a victim of a hacker if you have not taken care of the proper IT security measures. An educational animated film about Botnets and the effect Bots, Virus and Worms can have on one's and other's computer. http...
  • LOBSTER’s Catch Offers Security Research Opportunity

    A selection of files is now available to researchers interested in evaluating cyber-attack detection methods, or in studying data from real life attacks. The attack trace files can be downloaded from a website created as a spin-off of the LOBSTER pilot...
  • Hackers are giving up hacking

    Hackers are increasingly giving up hacking, why? Because its become boring, there is no glits and glam in ethical or malicious hacking anymore. http://international-hacker-n3td3v.blogspot.com/2007/07/hackers-are-giving-up-hacking.html I always knew...