Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: APWG Releases Phishing Activity Trends

    The Anti-Phishing Working Group (APWG) has just released their Phishing Activity Trends Report for the month of December. Overall, the report showed a decrease in activity from the previous month; however, there were a few notable exceptions. It appears the number of unique phishing sites has increased...
  • Blog Post: China running out of IP addresses

    Chinese officials are calling for a mass migration to IPv6 after disclosing that they have only 830 days' worth of IPv4 resources left. Around 80 per cent of China's IPv4 resources have now been taken up. The country's IP allocation recently exceeded Japan's, making it the second largest in the world...
  • Blog Post: Internet Explorer 8 (beta2) released

    Last week Microsoft released IE8 Beta2, the faster, easier and safer successor of the existing Internet Explorer. As there are a lot of changes (new default settings, new support for standards, new features), it's definitely woth to try and test IE8. It's probably a good idea to start testing the own...
  • Blog Post: Microsoft scoops up rootkit finder Komoku

    The start-up's rootkit detection technology will be added into Microsoft's Windows Live OneCare and Forefront security products. http://www.news.com/8301-13860_3-9899808-56.html?part=rss&subj=news&tag=2547-1_3-0-5 Urs
  • Blog Post: Automatic Patch-Based Exploit Generation

    Paper Abstract: In this paper, we propose techniques for automatic patch-based exploit generation, and show that our techniques can automatically generate exploits for vulnerable programs based upon patches provided via Windows Update. In many cases we are able to automatically generate exploits within...
  • Blog Post: Protecting your computer while travelling

    Protecting computer equipment is something that everyone should be concerned with today. It seems every week there is a news report of another stolen laptop with sensitive or confidential data on it. Here is a checklist that will help you prepare and protect your computer equipment while traveling anywhere...
  • Blog Post: Microsoft out-of-band security bulletin release for IE

    Microsoft has released an out-of-band security bulletin on March 30, 2010. The bulletin is being released to address new attacks against customers of Internet Explorer. Users of Internet Explorer 8 and Windows 7 are not vulnerable to these current attacks. However, the released update contains fixes...
  • Blog Post: Internet Explorer and Firefox Vulnerability Analysis Report

    Jeff Jones on his blog about the Internet Explorer and Firefox Vulnerability Analysis Report: For most people, their web browser is central to their interaction with the Internet, connecting to global web sites and helping them consume online services providing everything from booking flights to banking...
  • Blog Post: A very long list of new Microsoft products for 2008...

    Bink.nu has an extensive list of new software that Microsoft will be unleashing in the marketplace. See yourself: http://blogs.technet.com/tarpara/archive/2007/12/25/microsoft-s-new-year-is-gonna-bring-a-lot-of-change.aspx Urs
  • Blog Post: Study: 73% use Bank Password everywhere

    For years computer security experts have been preaching that users should never share the same password across their connected lives — at online banking sites, at Amazon, on their Web mail services, even on their cell phones. Apparently, most people ignore that advice. It really can't be repeated...
  • Blog Post: Internet Explorer security levels compared

    As a couple of people are looking at their IE currently, I found some interesting information on Steve Riley’s Technet blog: "A pretty good question came across the newsgroups the other day. Someone was asking what are the differences between IE's "medium" and "medium-high" security settings. I did...
  • Blog Post: Cybersecurity Today: The Wild, Wild West

    If you purchased a brand new computer today with all the latest security software and plug it into the Internet, how long would it be before the first hacker probed it? Answer : About four hours... http://www.newsfactor.com/story.xhtml?story_id=12100CEDYE09 Probing? 4 hours? I attached lately a...
  • Blog Post: What does it mean if my version of Windows is no longer supported?

    An unsupported version of Windows will no longer receive software updates from Windows Update. These include security updates that can help protect your PC from harmful viruses, spyware, and other malicious software, which can steal your personal information. Windows Update also installs the latest software...
  • Blog Post: German Police Creating LE Trojan

    German cops are pushing ahead with controversial plans, yet to be legally approved, to develop "remote forensic software" - in other words, a law enforcement Trojan. Leaked documents outline proposals by German firm Digitask to develop software to intercept Skype VoIP communications and SSL transmissions...
  • Blog Post: New Method IDs Phishing, Malicious Domains

    At a closed-door security summit hosted on Yahoo’s Sunnyvale campus last week, a researcher demonstrated a new technique to more easily identify phishing and other malicious Websites. Dan Hubbard, vice president of security research for Websense, showed a tool Websense researchers have built that...
  • Blog Post: Minimizing User Rights Can Increase Security

    Taking a least-privilege approach to user accounts is a key part of any in-depth defense strategy, many analysts and security pros say. "I think it's very important … not even just as [a component] of security, but in the broader sense [of] risk posed to the business in IT," said Scott Crawford, an...
  • Blog Post: Windows Server 2008 Security Guide - Beta release now available

    Every day, adversaries are attempting to invade our networks and access our servers, to bring them down, infect them with viruses, or steal information about customers, partners or employees. You are looking at Microsoft Windows Server 2008 to help to address these threats? To assist you in taking full...
  • Blog Post: Europe still top source of spam

    European spam networks have pumped out more unsolicited e-mail than those in the U.S. for the third month in a row, according to security vendor Symantec. Symantec called this a "significant shift" in spam trends as, historically, compromised U.S. computers have been used to send spam, and many spammers...
  • Blog Post: Survey Finds that 54% of Wireless Users Steal Wi-Fi Access

    Security firm Sophos reported that 54% of wireless users interviewed have admitted to using someone else's wireless Internet access. In a report, done by the firm on behalf of The Times, many Wi-Fi users fail to properly secure their wireless connection with passwords and encryption, allowing passers...
  • Blog Post: How Wi-Fi Attackers are poisoning web browsers

    Public Wi-Fi networks such as those in coffee shops and airports present a bigger security threat than ever to computer users because attackers can intercede over wireless to poison users' browser caches in order to present fake Web pages or even steal data at a later time. That’s according to security...
  • Blog Post: XBox Project Natal at E3

    Not really security relevant, but cool anyway... some more info on project Natal: http://news.cnet.com/8301-13772_3-20001174-52.html?part=rss&subj=news&tag=2547-1_3-0-20 What is project Natal? ;-) http://www.xbox.com/en-US/live/projectnatal/ -Urs
  • Blog Post: IT security guide: Understanding cyber-risks means knowing what questions to ask

    A good place for senior executives to start in trying to understand their companies' financial exposure to cyberthreats is by getting an overall assessment — not just from IT, but also from business units and corporate operations such as the human resources, legal and public relations departments. ...
  • Blog Post: CIA Monitors YouTube For Intelligence

    U.S. spies are looking increasingly online for intelligence and they've become major consumers of social media. In keeping with its mandate to gather intelligence, the CIA is watching YouTube. U.S. spies, now under the Director of National Intelligence (DNI), are looking increasingly online for intelligence;...
  • Blog Post: New Microsoft Windows cloud service for managing and securing PCs: Intune (Beta)

    Windows Intune Beta Windows Intune simplifies how businesses manage and secure PCs using Windows cloud services and Windows 7—so your computers and users can operate at peak performance, from virtually anywhere. Windows Intune is a comprehensive solution that includes PC management, malware protection...
  • Blog Post: Conficker's First Birthday Looms - Seven Million IPs Still Infected

    As Conficker approaches the first anniversary of its appearance in the wild, the Shadowserver Foundation says that at least seven million IP addresses — each representing one or more computers — are now infected by the worm. http://www.infosecurity-magazine.com/view/4941/confickers-first-birthday-looms...