Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: Protecting your computer while travelling

    Protecting computer equipment is something that everyone should be concerned with today. It seems every week there is a news report of another stolen laptop with sensitive or confidential data on it. Here is a checklist that will help you prepare and protect your computer equipment while traveling anywhere...
  • Blog Post: Microsoft Expands Security Information Sharing Program to CERTs

    Today at the annual AusCERT Asia Pacific Information Technology Security Conference, Microsoft Corp. announced the extension of the Microsoft Security Cooperation Program (SCP) to include computer emergency response teams (CERTs), computer security incident response teams (CSIRTS), and other response...
  • Blog Post: German Police Creating LE Trojan

    German cops are pushing ahead with controversial plans, yet to be legally approved, to develop "remote forensic software" - in other words, a law enforcement Trojan. Leaked documents outline proposals by German firm Digitask to develop software to intercept Skype VoIP communications and SSL transmissions...
  • Blog Post: Protecting Against Terrorism [PDF]

    Centre for the Protection of National Infrastructure: This publication offers security advice and good practice for any organisation looking to protect against the risk of a terrorist act or limit the damage such an incident could cause. It sets out how a security plan might be developed and updated...
  • Blog Post: IT security guide: Understanding cyber-risks means knowing what questions to ask

    A good place for senior executives to start in trying to understand their companies' financial exposure to cyberthreats is by getting an overall assessment — not just from IT, but also from business units and corporate operations such as the human resources, legal and public relations departments. ...
  • Blog Post: CIA Monitors YouTube For Intelligence

    U.S. spies are looking increasingly online for intelligence and they've become major consumers of social media. In keeping with its mandate to gather intelligence, the CIA is watching YouTube. U.S. spies, now under the Director of National Intelligence (DNI), are looking increasingly online for intelligence;...
  • Blog Post: To defeat a malicious botnet, build a friendly one

    Beating the "botnets"–armies of infected computers used to attack websites–requires borrowing tactics from the bad guys, say computer security researchers. A team at the University of Washington, US, wants to marshal swarms of good computers to neutralize the bad ones. They say their plan would be...
  • Blog Post: Big trouble with teen hackers

    Teenagers, including children as young as eleven and twelve years old, are increasingly becoming involved in serious cyber-criminal activity that exposes themselves and the users they target to a full range of dangerous repercussions. "Most have absolutely no idea of what getting they're into, they...
  • Blog Post: Trojans Dominated Malware Threats in Dec. '08

    Sunbelt Software has released its monthly data dump that charts the most commonly observed malware and spyware threats, and, as has been the case for a good while, trojan attacks continued to lead the way across the Top Ten rankings during Dec. 2008. http://securitywatch.eweek.com/exploits_and_attacks...
  • Blog Post: The Biggest Cloud on the Planet is Owned by ... the Crooks!

    Network World: Who's got the biggest cloud in the tech universe? Google? Pretty big, but no. Amazon? Lots and lots of servers, but not even close. Microsoft? They're just getting started. Household names all, but their capacity pales to that of the biggest cloud on the planet, the network of computers...
  • Blog Post: High-Tech Copy Machines a Gold Mine for Data Thieves

    Victor Beitner, a security expert who reconfigures photocopy machines destined for resale in Toronto, says businesses are completely unaware of the potential information security breach when the office photocopier is replaced. They think the copier is just headed for a junkyard but, in most cases...
  • Blog Post: Future Phishing

    Forget the Nigerian prince. Phishing scams are moving beyond the misspelled, far-fetched ruses that clog your in-box and beg for your bank codes. In the year to come, security professionals are warning of bank code-stealing exploits that are much slicker and more convincing--hidden in guises as harmless...
  • Blog Post: New Phishing/Storm Worm Variant Spreading

    US-CERT has received reports of new phishing activity, some of which has been linked to Storm Worm. The latest activity is centered around messages related to the recent earthquake in China and the upcoming Olympic Games. This Trojan is spread via an unsolicited email message that contains a link to...
  • Blog Post: Microsoft Botnet-hunting Tool Helps Bust Hackers

    Botnet fighters have another tool in their arsenal, thanks to Microsoft. Microsoft is giving law enforcers access to a special tool that keeps tabs on botnets, using data compiled from the 450 million computer users who have installed the Malicious Software Removal tool that ships with Windows. ...
  • Blog Post: The evolution of CyberCrime Inc

    There is no storefront or corporate headquarters for Cybercrime Inc., but savvy salesmen in a murky, borderless economy are moving merchandise by shilling credit card numbers - "two for the price one." "Sell fresh CC," promised one salesman who offered teaser credit card numbers for samples in New...
  • Blog Post: IC3's 2007 Internet Crime Report

    The USA's Internet Crime Complaint Center (IC3) is a partnership between the FBI and the National White Collar Crime Center (NW3C). Last week, the IC3 released its annual report for 2007. You can download a copy from here . From F-Secure: Malicious software and frauds are very closely related. Malware...
  • Blog Post: Internet Phone Systems Become the Fraudster's Tool

    Cyber criminals have found a new launching pad for their scams: the phone systems of small- and medium-sized businesses across the U.S. In recent weeks, they have hacked into dozens of telephone systems across the country, using them as a way to contact unsuspecting bank customers and trick them into...
  • Blog Post: A group of 15 Nations agree to start working together to reduce Cyberwarfare Threat

    [The Washington Post] A group of nations — including the United States, China and Russia — have for the first time signaled a willingness to engage in reducing the threat of attacks on each other’s computer networks. http://www.washingtonpost.com/wp-dyn/content/article/2010/07/16...
  • Blog Post: Slow And Silent Targeted Attacks On The Rise

    And another one in the same direction: The most determined cyber criminals don't necessarily work fast when they breach a network, and their infiltration is often silent and undetectable. But it's this brand of "low and slow" targeted attack that can also be the most deadly, security experts say:...
  • Blog Post: Thoughts of a Teenage Bot Master

    One day in May 2005, a 16-year-old hacker named "SoBe" opened his front door to find a swarm of FBI agents descending on his family's three-story house in Boca Raton, Florida. With an arm and leg in casts from a recent motorcycle accident, one agent grabbed his good arm while others seized thousands...
  • Blog Post: Microsoft Malware Removal Tool: Two million password stealers fingered

    Microsoft's Malicious Software Removal Tool - a program that removes malware from Windows machines - detected password-stealing software from more than 2 million PCs in the first week after it was updated. One password stealer, called Taterf, alone was detected on 700,000 computers in the first day...
  • Blog Post: A guide to basic computer forensics

    While some investigations rely on highly trained professionals using expensive tools and complex techniques, there are easier, cheaper methods you can use for basic investigation and analysis. In this article, we will focus on computer forensic techniques that are readily accessible to you as a mainstream...
  • Blog Post: OECD: Malicious Software (Malware): A Security Threat to the Internet Economy

    Excerpt: This report, developed in collaboration with experts, aims to inform policy makers about malware impacts, growth and evolution, and countermeasures to combat malware. It seeks to analyze some of the main issues associated with malware and to explore how the international community can better...
  • Blog Post: Microsoft Unveils One-Stop Service for Reporting Stolen Accounts

    Microsoft on Thursday unveiled a program to alert banks and online services when accounts they oversee are compromised. The Internet Fraud Alert will serve as a centralized repository for stolen account credentials and personal information, Microsoft said in a press release announcing the system. ...
  • Blog Post: Judge: Man can't be forced to divulge encryption passphrase

    Interesting... also how that wouldbe handled outside of the US. A federal judge in Vermont has ruled that prosecutors can't force a criminal defendant accused of having illegal images on his hard drive to divulge his PGP (Pretty Good Privacy) passphrase. U.S. Magistrate Judge Jerome Niedermeier ruled...