Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: New Microsoft Security Vulnerability Research and Defense blog

    The Security Vulnerability Research & Defense blog’s intent is to provide more information about Microsoft vulnerabilities, mitigations and workarounds, and active attacks. http://blogs.technet.com/swi/ Urs
  • Blog Post: Newest Security Reports Show Changing Threats

    Scott Hogg, Core Networking and Security: "I find it useful to seek out new perspectives on the ever-changing security realm. By reviewing these [security] reports, we can gain a greater understanding of the emerging Internet threats our organizations are facing." Includes links to various security...
  • Blog Post: Microsoft SDL team releases new security tools

    The Security Development Lifecycle (SDL) team at Microsoft released two security testing tools. BinScope Binary Analyzer BinScope is a Microsoft verification tool that analyzes binaries on a project-wide level to ensure that they have been built in compliance with Microsoft’s Security Development...
  • Blog Post: Microsoft: We took out Storm botnet

    Microsoft Corp. today took credit for crushing the Storm botnet, saying that the malware search-and-destroy tool it distributes to Windows users disinfected so many bots that the hackers threw in the towel. "They realized they were in our gun sights," said Jimmy Kuo, a principal architect with Microsoft...
  • Blog Post: Microsoft Files Patent for HoneyMonkey Exploit Finder

    Microsoft has filed a patent claim for the Strider HoneyMonkey malware/exploit detection system created by our internal research unit. The claim, currently being reviewed at Peer-to-Patent. The HoneyMonkey system, first discussed in August 2005, is best described as an automated Web patrol that uses...
  • Blog Post: Phishing, Worms Spike This Year, Say Microsoft and McAfee

    Scammers are targeting social networks with phishing scams and relying more heavily on worms and Trojans to attack computers, according to security trend reports to be released Monday by Microsoft and McAfee. http://news.cnet.com/8301-27080_3-10387768-245.html The Microsoft Security Intelligence...
  • Blog Post: New Phishing/Storm Worm Variant Spreading

    US-CERT has received reports of new phishing activity, some of which has been linked to Storm Worm. The latest activity is centered around messages related to the recent earthquake in China and the upcoming Olympic Games. This Trojan is spread via an unsolicited email message that contains a link to...
  • Blog Post: Conficker Advisories

    Microsoft Conficker guidance page for IT Professionals and those focused on security in the enterprise: http://technet.microsoft.com/en-us/security/dd452420.aspx Microsoft Conficker guidance page for consumers and home users: http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx ...
  • Blog Post: Microsoft Botnet-hunting Tool Helps Bust Hackers

    Botnet fighters have another tool in their arsenal, thanks to Microsoft. Microsoft is giving law enforcers access to a special tool that keeps tabs on botnets, using data compiled from the 450 million computer users who have installed the Malicious Software Removal tool that ships with Windows. ...
  • Blog Post: Introduction to Malware Analysis — Free Webcast

    From Lenny Zeltser: "My popular malware analysis course has helped IT administrators, security professionals, and malware specialists fight malicious code in their organizations. In this free webcast, I introduce the process of reverse-engineering malicious software. I cover behavioral and code analysis...
  • Blog Post: IC3's 2007 Internet Crime Report

    The USA's Internet Crime Complaint Center (IC3) is a partnership between the FBI and the National White Collar Crime Center (NW3C). Last week, the IC3 released its annual report for 2007. You can download a copy from here . From F-Secure: Malicious software and frauds are very closely related. Malware...
  • Blog Post: Black Hat: new operating systems security metric

    At the Black Hat Security Conference currently taking place in Amsterdam, researchers from the Zurich ETH (Swiss Federal Institute of Technology) have reported a new model for determining the security of operating systems. They don't just count the number of holes and how critical they are, but also...
  • Blog Post: Microsoft Windows OneCare 2.0 released

    Many people don’t have the time or technical expertise to keep up on PC management and protection. Today Microsoft released the next version of Windows Live OneCare, which provides all-in-one, self-updating PC Care designed to help consumers and small businesses maintain the security and performance...
  • Blog Post: Security Advisory 961051 - More information

    Microsoft revised the Workarounds section of Security Advisory 961051. The Security Vulnerability Research & Defense team wanted to share more detail about the vulnerability and explains the additional workarounds here to help you protect your computers: http://blogs.technet.com/swi/archive/2008...
  • Blog Post: Slow And Silent Targeted Attacks On The Rise

    And another one in the same direction: The most determined cyber criminals don't necessarily work fast when they breach a network, and their infiltration is often silent and undetectable. But it's this brand of "low and slow" targeted attack that can also be the most deadly, security experts say:...
  • Blog Post: New Zlob variant reconfigures routers

    A variant of the Zlob virus has emerged that can tweak DNS entries on standard commercial routers from an infected Windows PC. It uses a built-in list of standard router usernames and passwords. Successful attacks have already been observed on Linksys BEFSX41 routers and a Buffalo router using DD-WRT...
  • Blog Post: PGP adds encryption to Windows Mobile Smartphones

    PGP Corp. has introduced an encryption application that lets enterprise users protect all the data they carry around in their smartphones. PGP Mobile encrypts Windows Mobile-based data automatically, but still allows mobile data to be shared securely with other mobile and desktop users. The new crypto...
  • Blog Post: Researchers warn of AV software risks

    ...and why also the development of an AV solution needs to go through a Security Development Lifecycle (SDL)! The vulnerabilities in antivirus software make the programs as much a threat, as a help, to corporate network security: http://www.securityfocus.com/brief/632?ref=rss And did I allready...
  • Blog Post: Security for the youngest internet users - Security4Kids

    Have you ever heard about www.security4kids.ch ? If not, visiting the site should be one of your tasks for today! Especially if you’ve got children aged 7-15 yourself. But let’s go back to the beginning. The website www.security4kids.ch (in German and French and soon also in Italian) was launched...
  • Blog Post: Black Hat: Who patches security holes faster, Microsoft or Apple?

    Apple's teasing commercials that imply its software is safer than Microsoft's may not quite match the facts, according to new research revealed at the Black Hat conference on Thursday. Researchers from the Swiss Federal Institute of Technology looked at how many times over the past six years the two...
  • Blog Post: Security Secrets the Bad Guys don't want you to know

    [PCWorld] You already know the basics of internet security, right? But when you've got the basics covered, but you still don't feel secure, what can you do? Here are a few advanced security tips to help you thwart some of today's most common attacks. http://www.pcworld.com/article/201309/security_secrets_the_bad_guys_dont_want_you_to_know...
  • Blog Post: Top 100 Virus-Infected Web Sites Exposed

    Simply visiting one of the "Top 100 Dirtiest" Web sites - without downloading or even clicking anything - could expose your computer to infection and put your personal information into the hands of criminals, anti-virus software company Norton Symantec said. http://www.smh.com.au/technology/technology...
  • Blog Post: Microsoft Malware Removal Tool: Two million password stealers fingered

    Microsoft's Malicious Software Removal Tool - a program that removes malware from Windows machines - detected password-stealing software from more than 2 million PCs in the first week after it was updated. One password stealer, called Taterf, alone was detected on 700,000 computers in the first day...
  • Blog Post: OECD: Malicious Software (Malware): A Security Threat to the Internet Economy

    Excerpt: This report, developed in collaboration with experts, aims to inform policy makers about malware impacts, growth and evolution, and countermeasures to combat malware. It seeks to analyze some of the main issues associated with malware and to explore how the international community can better...
  • Blog Post: Researchers find hole in 'flawless' encryption technology

    Quantum cryptography, a new technology until now considered 100 per cent secure against attacks on sensitive data traffic, has a flaw after all, Swedish researchers say. "In computer terms, we've found a bug," said Jan-Aake Larsson, an associate professor of applied mathematics at the Linkoeping University...