Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: APWG Releases Phishing Activity Trends

    The Anti-Phishing Working Group (APWG) has just released their Phishing Activity Trends Report for the month of December. Overall, the report showed a decrease in activity from the previous month; however, there were a few notable exceptions. It appears the number of unique phishing sites has increased...
  • Blog Post: Internet Explorer 8 (beta2) released

    Last week Microsoft released IE8 Beta2, the faster, easier and safer successor of the existing Internet Explorer. As there are a lot of changes (new default settings, new support for standards, new features), it's definitely woth to try and test IE8. It's probably a good idea to start testing the own...
  • Blog Post: Microsoft out-of-band security bulletin release for IE

    Microsoft has released an out-of-band security bulletin on March 30, 2010. The bulletin is being released to address new attacks against customers of Internet Explorer. Users of Internet Explorer 8 and Windows 7 are not vulnerable to these current attacks. However, the released update contains fixes...
  • Blog Post: Internet Explorer and Firefox Vulnerability Analysis Report

    Jeff Jones on his blog about the Internet Explorer and Firefox Vulnerability Analysis Report: For most people, their web browser is central to their interaction with the Internet, connecting to global web sites and helping them consume online services providing everything from booking flights to banking...
  • Blog Post: A very long list of new Microsoft products for 2008...

    Bink.nu has an extensive list of new software that Microsoft will be unleashing in the marketplace. See yourself: http://blogs.technet.com/tarpara/archive/2007/12/25/microsoft-s-new-year-is-gonna-bring-a-lot-of-change.aspx Urs
  • Blog Post: Internet Explorer security levels compared

    As a couple of people are looking at their IE currently, I found some interesting information on Steve Riley’s Technet blog: "A pretty good question came across the newsgroups the other day. Someone was asking what are the differences between IE's "medium" and "medium-high" security settings. I did...
  • Blog Post: New Method IDs Phishing, Malicious Domains

    At a closed-door security summit hosted on Yahoo’s Sunnyvale campus last week, a researcher demonstrated a new technique to more easily identify phishing and other malicious Websites. Dan Hubbard, vice president of security research for Websense, showed a tool Websense researchers have built that...
  • Blog Post: Minimizing User Rights Can Increase Security

    Taking a least-privilege approach to user accounts is a key part of any in-depth defense strategy, many analysts and security pros say. "I think it's very important … not even just as [a component] of security, but in the broader sense [of] risk posed to the business in IT," said Scott Crawford, an...
  • Blog Post: How Wi-Fi Attackers are poisoning web browsers

    Public Wi-Fi networks such as those in coffee shops and airports present a bigger security threat than ever to computer users because attackers can intercede over wireless to poison users' browser caches in order to present fake Web pages or even steal data at a later time. That’s according to security...
  • Blog Post: Internet Explorer 8 Readiness Toolkit

    We just made Internet Explorer 8 Beta 1 available. This could be important if you are developing web applications or just if you are curious! :-) http://www.microsoft.com/windows/products/winfamily/ie/ie8/readiness/Install.htm See also: http://channel9.msdn.com/showpost.aspx?postid=388331 http...
  • Blog Post: Web 2.0, meet Internet attack 2.0

    The glitzy, interactive abilities of Web 2.0 have led to a profusion of new applications, but the technology also is bringing a new era of security vulnerabilities, a security researcher warned Wednesday. "Security was a challenge to begin with, but if anything it's getting harder in the Web 2.0 world...
  • Blog Post: Anatomy of a SQL Injection Incident

    Blog Posting from Neil Carpenter: "A number of people are reporting that 10K+ Web sites have been hacked via a SQL injection attack that injected a link to a malicious .js file into text fields in their database. Since the CSS Security team here at Microsoft worked with several of these incidents...
  • Blog Post: New Microsoft Security Vulnerability Research and Defense blog

    The Security Vulnerability Research & Defense blog’s intent is to provide more information about Microsoft vulnerabilities, mitigations and workarounds, and active attacks. http://blogs.technet.com/swi/ Urs
  • Blog Post: The first year of IE7

    It’s been a little over a year since Microsoft released IE7 on Windows XP and for Windows Vista. According to internal Microsoft research based on data from Visual Sciences Corporation, there are over 300 million users are experiencing the web with IE7. This makes IE7 the second most popular browser...
  • Blog Post: Malvertising

    Malvertising (malicious advertising) is a reasonably fresh take on an online criminal methodology that appears focused on the installation of unwanted or outright malicious software through the use of internet advertising media networks, exchanges and other user supplied content publishing services common...
  • Blog Post: Security Advisory 961051 - More information

    Microsoft revised the Workarounds section of Security Advisory 961051. The Security Vulnerability Research & Defense team wanted to share more detail about the vulnerability and explains the additional workarounds here to help you protect your computers: http://blogs.technet.com/swi/archive/2008...
  • Blog Post: Security for the youngest internet users - Security4Kids

    Have you ever heard about www.security4kids.ch ? If not, visiting the site should be one of your tasks for today! Especially if you’ve got children aged 7-15 yourself. But let’s go back to the beginning. The website www.security4kids.ch (in German and French and soon also in Italian) was launched...
  • Blog Post: Microsoft calls for talks on Internet trust, safety

    Microsoft today called for broad discussions about the safety of the Internet in an initiative it dubbed "End to End Trust" in a white paper released during the RSA Conference that opened today in San Francisco. In a keynote address at the security conference, Craig Mundie, chief research and strategy...
  • Blog Post: Study: Consumers Don't Use Anti-Phishing Defenses

    "Across the globe, Windows Internet Explorer 7 has more than 100 million users seeing green," VeriSign said in a press release about Extended Validation SSL technology earlier this month. About 5,000 sites are using the new technology, which gives users a "green bar" in their browsers when they prepare...
  • Blog Post: Report details hacks targeting Google and others

    It’s been three weeks since Google announced that a sophisticated and coordinated hack attack dubbed Operation Aurora recently targeted it and numerous other U.S. companies. Now a leading computer forensic firm is providing the closest look so far at the nature of the attacks, and attackers that struck...
  • Blog Post: Sun and Apple Updates – A Sheer Nuisance!!

    From Roger's blog post: http://blogs.technet.com/rhalbheer/archive/2008/03/19/sun-and-apple-update-a-sheer-nuisance.aspx http://blogs.technet.com/rhalbheer/archive/2008/03/25/sun-and-apple-updates-a-sheer-nuisance-part-2.aspx Well, a little bit in the same direction as my previus post: http://blogs...
  • Blog Post: Microsoft Security Bulletin MS08-078 – Critical avaiable now!

    Microsoft Security Bulletin MS08-078 – Critical is now avaiable, patches are there and ready for download: http://www.microsoft.com/technet/security/bulletin/MS08-078.mspx . Please install, update as soon as possible! Urs