Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: Researchers Find a New Way to Attack the Cloud

    Amazon and Microsoft have been pushing cloud-computing services as a low-cost way to outsource raw computing power, but the products may introduce new security problems that have yet to be fully explored, according to researchers at the University of California, San Diego, and the Massachusetts Institute...
  • Blog Post: Download: Windows Vista One Year Vulnerability Report

    Excerpt of a blog by Jeff Jones: Windows Vista shipped to business customers on the last day of November 2006, so the end of November 2007 marks the one year anniversary for supported production use of the product. This paper analyzes the vulnerability disclosures and security updates for the first...
  • Blog Post: Ninety-five percent of e-mails sent in 2007 are junk

    Barracuda Networks released its annual spam report, which shows between 90 to 95 percent of all e-mail sent in 2007 is spam. This is based on an analysis of more than 1 billion daily e-mail messages sent to its more than 50,000 customers worldwide. The above figures represent an increase from the...
  • Blog Post: Internet Explorer 8 Readiness Toolkit

    We just made Internet Explorer 8 Beta 1 available. This could be important if you are developing web applications or just if you are curious! :-) http://www.microsoft.com/windows/products/winfamily/ie/ie8/readiness/Install.htm See also: http://channel9.msdn.com/showpost.aspx?postid=388331 http...
  • Blog Post: Spyware authors offer dollars for downloads

    Spyware authors are offering financial rewards to botnet operators and other cyber-criminals who covertly install their spyware, security experts warned today. http://www.vnunet.com/vnunet/news/2212403/spyware-authors-offer-dollars Urs
  • Blog Post: To defeat a malicious botnet, build a friendly one

    Beating the "botnets"–armies of infected computers used to attack websites–requires borrowing tactics from the bad guys, say computer security researchers. A team at the University of Washington, US, wants to marshal swarms of good computers to neutralize the bad ones. They say their plan would be...
  • Blog Post: A strong Password isn’t the strongest Security

    Make your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it — never write it down. And, oh yes, change it every few months... Yes, that's it? Or not? "Keeping a keylogger off your machine is about a trillion times more important than the strength...
  • Blog Post: New massive Botnet twice the size of Storm

    A new botnet twice the size of Storm has ballooned to an army of over 400,000 bots, including machines in the Fortune 500, according to botnet researchers at Damballa. The so-called Kraken botnet has been spotted in at least 50 Fortune 500 companies and is undetectable in over 80 percent of machines...
  • Blog Post: Why Technology Isn't The Answer To Better Security

    "Too many organizations still lack coherent, enforced and forward-thinking security processes, our survey shows. While 59 percent of respondents said they have an "overall information security strategy," that's up just two points from last year and it's not enough, says Mark Lobel, advisory services...
  • Blog Post: Microsoft releases Windows Phone 7 to manufacturers (RTM)

    Security relevant? Not sure... Fun? Definitely! Can't await mine... ;-) But to still give it a security touch, let's put this under 'Consumerization of IT'. http://www.cnet.com/8301-17918_1-20015314-85.html?tag=mncol;1n -Urs
  • Blog Post: Security Vulnerability Research & Defense Blog on new patches

    Detailed technical information about the latest updates released this month. http://blogs.technet.com/swi/ Urs
  • Blog Post: Web 2.0, meet Internet attack 2.0

    The glitzy, interactive abilities of Web 2.0 have led to a profusion of new applications, but the technology also is bringing a new era of security vulnerabilities, a security researcher warned Wednesday. "Security was a challenge to begin with, but if anything it's getting harder in the Web 2.0 world...
  • Blog Post: Advances in BitLocker Drive Encryption

    What's new in Windows Vista SP1 or Windows Server 2008 Bitlocker? http://technet.microsoft.com/en-us/magazine/cc510321.aspx Urs
  • Blog Post: 'Out of office' messages turned into spam relays

    Spammers have found a new trick that gets around many current anti-spam filters: abusing the "out of the office" auto-respond feature found in legitimate webmail services. http://www.techworld.com/security/news/index.cfm?newsID=11544 Urs
  • Blog Post: Covert channel vulnerabilities in anonymity systems

    Excerpt: The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protect users’ privacy by restricting unauthorized access to their identity. This requirement can be considered as a flow control policy in the well established field of multilevel secure systems. I...
  • Blog Post: Windows 7 Security Story May Appeal to Enterprises

    The Windows 7 security story has three main chapters that have received a fair amount of attention: DirectAccess, BitLocker To Go, and AppLocker. With these, as well as features such as BranchCache and enhancements to UAC (user account control), officials at Microsoft have said they feel they are pushing...
  • Blog Post: Ballmer Outlines Vision For Next Computing Revolution

    The rise of PCs, graphical user interfaces, the Internet, and Web 2.0 technologies have obviously had major impacts on the IT industry, but according to Microsoft (NSDQ:MSFT) CEO Steve Ballmer, the computing revolution that's about to take place will tie up all the loose ends from previous ones. In...
  • Blog Post: Microsoft Malware Removal Starter Kit (2008-06)

    Many small- and medium-sized organizations use antivirus software, and yet new viruses, worms, and other forms of malicious software (malware) continue to infect large numbers of computers in these Organizations. Malware proliferates at alarming speed and in many different ways, which makes it Particularly...
  • Blog Post: Seattle Tops List of Riskiest Cyber Crime Cities!

    MSNBC:Seattle is the riskiest online city, according to a new survey. Symantec says Seattle tops the list because people are more likely to access the Web each day and use the Internet for shopping and banking, and because of the proliferation of wireless Internet access. http://www.msnbc.msn.com...
  • Blog Post: Big trouble with teen hackers

    Teenagers, including children as young as eleven and twelve years old, are increasingly becoming involved in serious cyber-criminal activity that exposes themselves and the users they target to a full range of dangerous repercussions. "Most have absolutely no idea of what getting they're into, they...
  • Blog Post: Trojans Dominated Malware Threats in Dec. '08

    Sunbelt Software has released its monthly data dump that charts the most commonly observed malware and spyware threats, and, as has been the case for a good while, trojan attacks continued to lead the way across the Top Ten rankings during Dec. 2008. http://securitywatch.eweek.com/exploits_and_attacks...
  • Blog Post: The Microsoft Security Update Guide

    This guide was designed to help IT professionals better understand and use Microsoft security release information, processes, communications, and tools. Our goal is to help IT professionals manage organizational risk and develop a repeatable, effective deployment mechanism for security updates. http...
  • Blog Post: VBootkit vs. Bitlocker in TPM mode

    "So at HITB in Dubai this week - some researchers announced a proof of concept 'bootkit' for Vista. A bootkit is a rootkit that is able to load from a master boot record and persist in memory all the way through the transition to protected mode and the startup of the OS. It's a very interesting type...
  • Blog Post: 9 Ways to Increase the Security of Your Laptop While on the Road

    Using your laptop to get work done away from your office or on the road is becoming widely accepted. But this rapid growth in laptop computing has made portable systems the target for theft around the world. If your laptop computer is stolen, company information can be exposed, as well as your personal...
  • Blog Post: Do You Need A Secure Flash Drive?

    PCMAG.COM: "I've long been a big fan of USB flash drives for carrying around the data that I need on multiple computers. They are an easy way to backup your data, and move files between computers. I even carry around some of the programs I use all the time on one of these drives, including Firefox, Roboform...