Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: The Open Computer Forensics Architecture (OCFA)

    The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework built by the Dutch National Police Agency. The main goal is to automate the digital forensic process to speed up the investigation and give tactical investigators direct access to the seized data through an easy...
  • Blog Post: German Police Creating LE Trojan

    German cops are pushing ahead with controversial plans, yet to be legally approved, to develop "remote forensic software" - in other words, a law enforcement Trojan. Leaked documents outline proposals by German firm Digitask to develop software to intercept Skype VoIP communications and SSL transmissions...
  • Blog Post: Advances in BitLocker Drive Encryption

    What's new in Windows Vista SP1 or Windows Server 2008 Bitlocker? http://technet.microsoft.com/en-us/magazine/cc510321.aspx Urs
  • Blog Post: New Phishing/Storm Worm Variant Spreading

    US-CERT has received reports of new phishing activity, some of which has been linked to Storm Worm. The latest activity is centered around messages related to the recent earthquake in China and the upcoming Olympic Games. This Trojan is spread via an unsolicited email message that contains a link to...
  • Blog Post: The evolution of CyberCrime Inc

    There is no storefront or corporate headquarters for Cybercrime Inc., but savvy salesmen in a murky, borderless economy are moving merchandise by shilling credit card numbers - "two for the price one." "Sell fresh CC," promised one salesman who offered teaser credit card numbers for samples in New...
  • Blog Post: IC3's 2007 Internet Crime Report

    The USA's Internet Crime Complaint Center (IC3) is a partnership between the FBI and the National White Collar Crime Center (NW3C). Last week, the IC3 released its annual report for 2007. You can download a copy from here . From F-Secure: Malicious software and frauds are very closely related. Malware...
  • Blog Post: Slow And Silent Targeted Attacks On The Rise

    And another one in the same direction: The most determined cyber criminals don't necessarily work fast when they breach a network, and their infiltration is often silent and undetectable. But it's this brand of "low and slow" targeted attack that can also be the most deadly, security experts say:...
  • Blog Post: Microsoft Malware Removal Tool: Two million password stealers fingered

    Microsoft's Malicious Software Removal Tool - a program that removes malware from Windows machines - detected password-stealing software from more than 2 million PCs in the first week after it was updated. One password stealer, called Taterf, alone was detected on 700,000 computers in the first day...
  • Blog Post: A guide to basic computer forensics

    While some investigations rely on highly trained professionals using expensive tools and complex techniques, there are easier, cheaper methods you can use for basic investigation and analysis. In this article, we will focus on computer forensic techniques that are readily accessible to you as a mainstream...
  • Blog Post: Microsoft cloud-computing service offers federal agencies

    New Microsoft cloud-computing service offers federal agencies a high level of security, including biometric access control and fingerprinting for background checks. http://news.cnet.com/8301-27080_3-10459301-245.html?part=rss&subj=news&tag=2547-1_3-0-20 -Urs
  • Blog Post: MS: What We Know (and Learned) from the Waledac Takedown

    Very interesting article from the MSRC: Recently, following an investigation to which various members of the MMPC contributed, Microsoft’s Digital Crimes Unit initiated a takedown of the Waledac botnet in an action known as Operation b49, an ongoing operation to disrupt the botnet for the long term....
  • Blog Post: Report details hacks targeting Google and others

    It’s been three weeks since Google announced that a sophisticated and coordinated hack attack dubbed Operation Aurora recently targeted it and numerous other U.S. companies. Now a leading computer forensic firm is providing the closest look so far at the nature of the attacks, and attackers that struck...
  • Blog Post: Pentagon Searches for ‘Digital DNA’ to Identify Hackers

    One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying to fix that, with a new effort to develop the “cyber equivalent of fingerprints or DNA” that can identify even the best-cloaked hackers. ...
  • Blog Post: Forensics Plan Guide (GIAC)

    The Forensics Plan Guide defines the basic elements of a Forensic Plan from the first initial contact through submission of the final Forensic Report. The document also includes 'The Forensic Cookbook' which illustrates the use of selected products and procedures, providing additional insight and configuration...