Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: Anti-DoS Dynamic IP Restrictions for IIS 7.0 Hits Beta2

    Microsoft has made available for download the second Beta development milestone of an anti-DoS extension for version 7.0 of Internet Information Services [IIS]. The Microsoft Dynamic IP Restrictions for IIS 7.0 has reached Beta2 and is up for grabs via the Microsoft Download Center in two flavors, 32...
  • Blog Post: German Police Creating LE Trojan

    German cops are pushing ahead with controversial plans, yet to be legally approved, to develop "remote forensic software" - in other words, a law enforcement Trojan. Leaked documents outline proposals by German firm Digitask to develop software to intercept Skype VoIP communications and SSL transmissions...
  • Blog Post: New Method IDs Phishing, Malicious Domains

    At a closed-door security summit hosted on Yahoo’s Sunnyvale campus last week, a researcher demonstrated a new technique to more easily identify phishing and other malicious Websites. Dan Hubbard, vice president of security research for Websense, showed a tool Websense researchers have built that...
  • Blog Post: Minimizing User Rights Can Increase Security

    Taking a least-privilege approach to user accounts is a key part of any in-depth defense strategy, many analysts and security pros say. "I think it's very important … not even just as [a component] of security, but in the broader sense [of] risk posed to the business in IT," said Scott Crawford, an...
  • Blog Post: Model predicts chance of software flaws

    Researchers from a German university have developed a model to predict programming errors in applications. The method has the potential to save software companies money by allowing them to isolate parts of their code that need more rigorous testing, said Kim Herzig, a researcher at the Universität...
  • Blog Post: Windows Server 2008 Security Guide - Beta release now available

    Every day, adversaries are attempting to invade our networks and access our servers, to bring them down, infect them with viruses, or steal information about customers, partners or employees. You are looking at Microsoft Windows Server 2008 to help to address these threats? To assist you in taking full...
  • Blog Post: Identity management critical for security, government IT shops say

    A majority of government IT organizations say identity management is very important to securing their networks and will become even more so over the next five years, but that funding to keep pace is a major impediment to growth. The respondents also said they think identity management is relevant...
  • Blog Post: Europe still top source of spam

    European spam networks have pumped out more unsolicited e-mail than those in the U.S. for the third month in a row, according to security vendor Symantec. Symantec called this a "significant shift" in spam trends as, historically, compromised U.S. computers have been used to send spam, and many spammers...
  • Blog Post: How Wi-Fi Attackers are poisoning web browsers

    Public Wi-Fi networks such as those in coffee shops and airports present a bigger security threat than ever to computer users because attackers can intercede over wireless to poison users' browser caches in order to present fake Web pages or even steal data at a later time. That’s according to security...
  • Blog Post: Protecting Against Terrorism [PDF]

    Centre for the Protection of National Infrastructure: This publication offers security advice and good practice for any organisation looking to protect against the risk of a terrorist act or limit the damage such an incident could cause. It sets out how a security plan might be developed and updated...
  • Blog Post: Application Lockdown with Software Restriction Policies

    When IT professionals look to reduce the total cost of ownership, or TCO, of their desktop machines, there are two key strategies that often come to mind. The first one is to get your desktop users' accounts out of the Administrators group. And the second one is to limit the applications that the users...
  • Blog Post: IT security guide: Understanding cyber-risks means knowing what questions to ask

    A good place for senior executives to start in trying to understand their companies' financial exposure to cyberthreats is by getting an overall assessment — not just from IT, but also from business units and corporate operations such as the human resources, legal and public relations departments. ...
  • Blog Post: Microsoft SQL Server 2008 Encryption (TechArticles)

    Two interesting blogs found on Microsoft SQL Server 2008 and encription: SQL Server 2008 Encryption Keys http://blogs.technet.com/andrew/archive/2007/12/24/sql-server-2008-encryption-keys.aspx SQL Server 2008 Transparent Data Encryption and Replication http://blogs.technet.com/andrew/archive/2007...
  • Blog Post: CIA Monitors YouTube For Intelligence

    U.S. spies are looking increasingly online for intelligence and they've become major consumers of social media. In keeping with its mandate to gather intelligence, the CIA is watching YouTube. U.S. spies, now under the Director of National Intelligence (DNI), are looking increasingly online for intelligence;...
  • Blog Post: New Microsoft Windows cloud service for managing and securing PCs: Intune (Beta)

    Windows Intune Beta Windows Intune simplifies how businesses manage and secure PCs using Windows cloud services and Windows 7—so your computers and users can operate at peak performance, from virtually anywhere. Windows Intune is a comprehensive solution that includes PC management, malware protection...
  • Blog Post: Conficker's First Birthday Looms - Seven Million IPs Still Infected

    As Conficker approaches the first anniversary of its appearance in the wild, the Shadowserver Foundation says that at least seven million IP addresses — each representing one or more computers — are now infected by the worm. http://www.infosecurity-magazine.com/view/4941/confickers-first-birthday-looms...
  • Blog Post: Researchers Find a New Way to Attack the Cloud

    Amazon and Microsoft have been pushing cloud-computing services as a low-cost way to outsource raw computing power, but the products may introduce new security problems that have yet to be fully explored, according to researchers at the University of California, San Diego, and the Massachusetts Institute...
  • Blog Post: Download: Windows Vista One Year Vulnerability Report

    Excerpt of a blog by Jeff Jones: Windows Vista shipped to business customers on the last day of November 2006, so the end of November 2007 marks the one year anniversary for supported production use of the product. This paper analyzes the vulnerability disclosures and security updates for the first...
  • Blog Post: Ninety-five percent of e-mails sent in 2007 are junk

    Barracuda Networks released its annual spam report, which shows between 90 to 95 percent of all e-mail sent in 2007 is spam. This is based on an analysis of more than 1 billion daily e-mail messages sent to its more than 50,000 customers worldwide. The above figures represent an increase from the...
  • Blog Post: Internet Explorer 8 Readiness Toolkit

    We just made Internet Explorer 8 Beta 1 available. This could be important if you are developing web applications or just if you are curious! :-) http://www.microsoft.com/windows/products/winfamily/ie/ie8/readiness/Install.htm See also: http://channel9.msdn.com/showpost.aspx?postid=388331 http...
  • Blog Post: Spyware authors offer dollars for downloads

    Spyware authors are offering financial rewards to botnet operators and other cyber-criminals who covertly install their spyware, security experts warned today. http://www.vnunet.com/vnunet/news/2212403/spyware-authors-offer-dollars Urs
  • Blog Post: Microsoft Releases Beta of Integrated Security System Forefront “Stirling”

    At RSA Conference 2008, Microsoft announced the availability of the public beta release of its next-generation Microsoft Forefront security solution, currently code-named “Stirling.” Microsoft Forefront “Stirling” is an integrated security system that is designed to deliver comprehensive, coordinated...
  • Blog Post: To defeat a malicious botnet, build a friendly one

    Beating the "botnets"–armies of infected computers used to attack websites–requires borrowing tactics from the bad guys, say computer security researchers. A team at the University of Washington, US, wants to marshal swarms of good computers to neutralize the bad ones. They say their plan would be...
  • Blog Post: Microsoft Security Assessment Tool v.3.5 (2008-06)

    The Microsoft Security Assessment Tool (MSAT) is a free tool designed to help organizations like yours assess weaknesses in your current IT security environment, reveal a prioritized list of issues, and help provide specific guidance to minimize those risks. MSAT is an easy, cost-effective way to begin...
  • Blog Post: A strong Password isn’t the strongest Security

    Make your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it — never write it down. And, oh yes, change it every few months... Yes, that's it? Or not? "Keeping a keylogger off your machine is about a trillion times more important than the strength...