Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: Windows 7 and Security

    As Windows 7 is not too far away and as many are allready using or testing Windows 7, here a list of interesting documentation: What's New in Windows 7 for IT Pros (Beta) http://technet.microsoft.com/de-de/library/dd349334(en-us).aspx Windows 7 Security Enhancements http://technet.microsoft.com...
  • Blog Post: Microsoft Links Security Guidelines to Agile Development

    Microsoft released a template for applying its Security Development Lifecycle (SDL) methodology to agile software development projects built with the Visual Studio development environment. http://www.infoworld.com/d/developer-world/microsoft-links-security-guidelines-agile-development-738 http://www...
  • Blog Post: Slow And Silent Targeted Attacks On The Rise

    And another one in the same direction: The most determined cyber criminals don't necessarily work fast when they breach a network, and their infiltration is often silent and undetectable. But it's this brand of "low and slow" targeted attack that can also be the most deadly, security experts say:...
  • Blog Post: Top 100 Virus-Infected Web Sites Exposed

    Simply visiting one of the "Top 100 Dirtiest" Web sites - without downloading or even clicking anything - could expose your computer to infection and put your personal information into the hands of criminals, anti-virus software company Norton Symantec said. http://www.smh.com.au/technology/technology...
  • Blog Post: Draft guidance for securing servers (NIST)

    The National Institute of Standards and Technology is seeking comment on its draft guidelines for securing servers, released this week. NIST Special Publication 800-123, "Guide to General Server Security," makes recommendations for securing server operating systems and software in addition to maintaining...
  • Blog Post: Top 9 Dirty Tricks Scammers Use

    What the average guy might call a con is known in the security world as social engineering. Social engineering is the criminal art of scamming a person into doing something or divulging sensitive information. These days, there are thousands of ways for con artists to pull off their tricks. Here we look...
  • Blog Post: Elevation of Privilege (EoP) Card Game

    Elevation of Privilege is the easy way to get started threat modeling. Threat modeling is a core component of the design phase in the Microsoft Security Development Lifecycle (SDL). The Elevation of Privilege (EoP) card game helps clarify the details of threat modeling and examines possible threats...
  • Blog Post: Microsoft Malware Protection Center - The Stuxnet Sting

    For the past week or so, MSRC has been closely tracking a new family of threats called Stuxnet (a name derived from some of the filename/strings in the malware — mrxcls.sys, mrxnet.sys). In the past few days, it has become a popular topic of discussion amongst security researchers and in the media...
  • Blog Post: Microsoft Security Awareness Toolkit

    Information security awareness and training is critical to any organization’s information security strategy and operations. People are in many cases the last line of defense against threats such as malicious code, disgruntled employees, and malicious third parties. Microsoft offers the security awareness...
  • Blog Post: What your users don't know about vulnerabilities can hurt you

    DarkReading: If your security strategy relies on end users to perform updates or avoid risky behavior, then it's time to ask yourself a question: How much do end users really know about security vulnerabilities? "Non-IT folks are often only aware of security vulnerabilities that are covered in mainstream...
  • Blog Post: New Attack Cracks Common Wi-Fi Encryption in a Minute

    Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. Last November, security researchers first showed how WPA could be broken, but the Japanese researchers have taken the attack to a new level, according to Dragos...
  • Blog Post: Report details hacks targeting Google and others

    It’s been three weeks since Google announced that a sophisticated and coordinated hack attack dubbed Operation Aurora recently targeted it and numerous other U.S. companies. Now a leading computer forensic firm is providing the closest look so far at the nature of the attacks, and attackers that struck...