Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: Guidelines for the Secure Deployment of IPv6 (Draft)

    [NIST] With the dwindling number of IPv4 addresses, the Office of Management and Budget (OMB) mandated that U.S. federal agencies begin using the IPv6 protocol. This document provides guidelines for organizations to securely deploy IPv6. http://csrc.nist.gov/publications/drafts/800-119/draft-sp800...
  • Blog Post: VBootkit vs. Bitlocker in TPM mode

    "So at HITB in Dubai this week - some researchers announced a proof of concept 'bootkit' for Vista. A bootkit is a rootkit that is able to load from a master boot record and persist in memory all the way through the transition to protected mode and the startup of the OS. It's a very interesting type...
  • Blog Post: Microsoft Security Compliance Manager released

    The Security Compliance Manager will help you accelerate knowledge to merge best practices, customize once to centralize decision making, and export to multiple formats to enable monitoring, verification, and compliance. The tool is designed to help accelerate your organization’s ability to efficiently...
  • Blog Post: Anatomy of a SQL Injection Incident

    Blog Posting from Neil Carpenter: "A number of people are reporting that 10K+ Web sites have been hacked via a SQL injection attack that injected a link to a malicious .js file into text fields in their database. Since the CSS Security team here at Microsoft worked with several of these incidents...
  • Blog Post: The Biggest Cloud on the Planet is Owned by ... the Crooks!

    Network World: Who's got the biggest cloud in the tech universe? Google? Pretty big, but no. Amazon? Lots and lots of servers, but not even close. Microsoft? They're just getting started. Household names all, but their capacity pales to that of the biggest cloud on the planet, the network of computers...
  • Blog Post: Hold on to Your Keys!

    There have been a few recent incidents of what we previously thought was extremely rare — malware authors using code signing certificates that were issued to companies with good reputations. The high-profile Stuxnet incident included validly signed malware with misappropriated Authenticode certificates...
  • Blog Post: New Microsoft Security Vulnerability Research and Defense blog

    The Security Vulnerability Research & Defense blog’s intent is to provide more information about Microsoft vulnerabilities, mitigations and workarounds, and active attacks. http://blogs.technet.com/swi/ Urs
  • Blog Post: Newest Security Reports Show Changing Threats

    Scott Hogg, Core Networking and Security: "I find it useful to seek out new perspectives on the ever-changing security realm. By reviewing these [security] reports, we can gain a greater understanding of the emerging Internet threats our organizations are facing." Includes links to various security...
  • Blog Post: Microsoft Offers Developers Cloud Security Tips

    Microsoft this week published a best practices guide for writing applications to its Windows Azure cloud computing environment. http://download.microsoft.com/download/7/3/E/73E4EE93-559F-4D0F-A6FC-7FEC5F1542D1/SecurityBestPracticesWindowsAzureApps.docx "We wrote this paper because no matter how many...
  • Blog Post: Infosec/Microsoft: Security community must work together

    Microsoft has called on companies to work together to improve overall security, and not just rely on the police to do it for them. Ed Gibson, Microsoft's chief security advisor in the UK, said during his keynote at Infosecurity Europe 2008 that security affects the entire industry and that companies...
  • Blog Post: So Much Data, So Little Encryption

    If you go solely by top-level stats on encryption use, you'll come away feeling pretty secure — 86 percent of the 499 business technology professionals responding to our InformationWeek Analytics State of Encryption Survey employ encryption of some type. But that finding doesn't begin to tell the real...
  • Blog Post: Microsoft SDL team releases new security tools

    The Security Development Lifecycle (SDL) team at Microsoft released two security testing tools. BinScope Binary Analyzer BinScope is a Microsoft verification tool that analyzes binaries on a project-wide level to ensure that they have been built in compliance with Microsoft’s Security Development...
  • Blog Post: Microsoft buys U-Prove technology

    Microsoft Corp. hopes to beef up online privacy with the acquisition of the U-Prove technology, the company announced on Thursday. U-Prove was developed by Stefan Brands at Credentica Inc. to allow Internet users to disclose only the minimum amount of personal information when conducting electronic...
  • Blog Post: Future Phishing

    Forget the Nigerian prince. Phishing scams are moving beyond the misspelled, far-fetched ruses that clog your in-box and beg for your bank codes. In the year to come, security professionals are warning of bank code-stealing exploits that are much slicker and more convincing--hidden in guises as harmless...
  • Blog Post: Phishing, Worms Spike This Year, Say Microsoft and McAfee

    Scammers are targeting social networks with phishing scams and relying more heavily on worms and Trojans to attack computers, according to security trend reports to be released Monday by Microsoft and McAfee. http://news.cnet.com/8301-27080_3-10387768-245.html The Microsoft Security Intelligence...
  • Blog Post: Where in the World do Viruses come from?

    The U.S. continues to dominate as the main source of the world's viruses, producing 15.9 percent of all viruses. It is followed closely by Brazil, which produces 14.5 percent (similar levels to last month's 14.1 percent). You can see more about virus trends from the Microsoft Security Intelligence...
  • Blog Post: Conficker Advisories

    Microsoft Conficker guidance page for IT Professionals and those focused on security in the enterprise: http://technet.microsoft.com/en-us/security/dd452420.aspx Microsoft Conficker guidance page for consumers and home users: http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx ...
  • Blog Post: Reminder: Support for Windows XP SP2 and Windows 2000 ended July 13, 2010

    As Microsoft announced in 2008, support for Windows XP Service Pack 2 (SP2) will end on July 13, 2010. Support for Windows 2000 will end on the same date. Customers running an unsupported version of Windows or Windows service pack will not be eligible for any Microsoft support options. Updates, including...
  • Blog Post: Introduction to Malware Analysis — Free Webcast

    From Lenny Zeltser: "My popular malware analysis course has helped IT administrators, security professionals, and malware specialists fight malicious code in their organizations. In this free webcast, I introduce the process of reverse-engineering malicious software. I cover behavioral and code analysis...
  • Blog Post: IC3's 2007 Internet Crime Report

    The USA's Internet Crime Complaint Center (IC3) is a partnership between the FBI and the National White Collar Crime Center (NW3C). Last week, the IC3 released its annual report for 2007. You can download a copy from here . From F-Secure: Malicious software and frauds are very closely related. Malware...
  • Blog Post: Microsoft support lifecycle for service Packs

    Perhaps a good idea to do some end-of-year cleanup! You can find what product services packs are supported here: http://support.microsoft.com/gp/lifesupsps Urs
  • Blog Post: C64 as a webserver?! ;-)

    An entire Web site has been 100% developed on the Commodore 64. The little keyboard box you see there and that big huge disk drive is where the Web page is stored. So… if it takes a while for the Web site to load on your computer, especially the picture, remember the computer is only 1 Mhz in speed and...
  • Blog Post: Security Advisory 961051 - More information

    Microsoft revised the Workarounds section of Security Advisory 961051. The Security Vulnerability Research & Defense team wanted to share more detail about the vulnerability and explains the additional workarounds here to help you protect your computers: http://blogs.technet.com/swi/archive/2008...
  • Blog Post: Microsoft adds new Anti-Exploit APIs into Windows

    Microsoft has announced plans to add new anti-exploitation APIs into Windows Vista SP1, Windows XP SP3 and Windows Server 2008 as part of a larger plan to secure the Windows ecosystem. According to Michael Howard, a senior program manager in Microsoft's security unit, the delivery of the new APIs...
  • Blog Post: New Twitter Account: @MSFTSecResponse

    MSRC blogs: We will use this account to augment the content here on the blog. For example, we will use the account to rapidly respond to emerging issues while we are gathering information for a more complete blog post. In addition, we will also use the account as a way to push content to our followers...