TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support options
For small and midsize businesses
For enterprises
For developers
For IT professionals
From partners
For technical support
Support offerings
For home users
More support
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Microsoft Switzerland Security Blog
Security informations brought to you by the Swiss Security Team.
Tags
Antimalware
Backup
Cloud
Consumer
Developer
email
Enterprise
Forensic
Fun
Guidance
Identity and Access Management
IE
Law Enforcment
Mobile
Network
Office
OS
PKI
Policy
SQL
Strategy
Survey
trends
Virtualization
WiFi
Windows
Browse by Tags
TechNet Blogs
»
Microsoft Switzerland Security Blog
»
All Tags
»
law enforcment
Related Posts
Blog Post:
Protecting your computer while travelling
Microsoft Swiss Security Team
Protecting computer equipment is something that everyone should be concerned with today. It seems every week there is a news report of another stolen laptop with sensitive or confidential data on it. Here is a checklist that will help you prepare and protect your computer equipment while traveling anywhere...
on
18 May 2009
Blog Post:
Microsoft Expands Security Information Sharing Program to CERTs
Microsoft Swiss Security Team
Today at the annual AusCERT Asia Pacific Information Technology Security Conference, Microsoft Corp. announced the extension of the Microsoft Security Cooperation Program (SCP) to include computer emergency response teams (CERTs), computer security incident response teams (CSIRTS), and other response...
on
28 May 2008
Blog Post:
German Police Creating LE Trojan
Microsoft Swiss Security Team
German cops are pushing ahead with controversial plans, yet to be legally approved, to develop "remote forensic software" - in other words, a law enforcement Trojan. Leaked documents outline proposals by German firm Digitask to develop software to intercept Skype VoIP communications and SSL transmissions...
on
14 Feb 2008
Blog Post:
Protecting Against Terrorism [PDF]
Microsoft Swiss Security Team
Centre for the Protection of National Infrastructure: This publication offers security advice and good practice for any organisation looking to protect against the risk of a terrorist act or limit the damage such an incident could cause. It sets out how a security plan might be developed and updated...
on
25 Mar 2010
Blog Post:
IT security guide: Understanding cyber-risks means knowing what questions to ask
Microsoft Swiss Security Team
A good place for senior executives to start in trying to understand their companies' financial exposure to cyberthreats is by getting an overall assessment — not just from IT, but also from business units and corporate operations such as the human resources, legal and public relations departments. ...
on
23 Oct 2008
Blog Post:
CIA Monitors YouTube For Intelligence
Microsoft Swiss Security Team
U.S. spies are looking increasingly online for intelligence and they've become major consumers of social media. In keeping with its mandate to gather intelligence, the CIA is watching YouTube. U.S. spies, now under the Director of National Intelligence (DNI), are looking increasingly online for intelligence;...
on
14 Feb 2008
Blog Post:
To defeat a malicious botnet, build a friendly one
Microsoft Swiss Security Team
Beating the "botnets"–armies of infected computers used to attack websites–requires borrowing tactics from the bad guys, say computer security researchers. A team at the University of Washington, US, wants to marshal swarms of good computers to neutralize the bad ones. They say their plan would be...
on
30 Apr 2008
Blog Post:
Big trouble with teen hackers
Microsoft Swiss Security Team
Teenagers, including children as young as eleven and twelve years old, are increasingly becoming involved in serious cyber-criminal activity that exposes themselves and the users they target to a full range of dangerous repercussions. "Most have absolutely no idea of what getting they're into, they...
on
7 Feb 2008
Blog Post:
Trojans Dominated Malware Threats in Dec. '08
Microsoft Swiss Security Team
Sunbelt Software has released its monthly data dump that charts the most commonly observed malware and spyware threats, and, as has been the case for a good while, trojan attacks continued to lead the way across the Top Ten rankings during Dec. 2008. http://securitywatch.eweek.com/exploits_and_attacks...
on
12 Jan 2009
Blog Post:
The Biggest Cloud on the Planet is Owned by ... the Crooks!
Microsoft Swiss Security Team
Network World: Who's got the biggest cloud in the tech universe? Google? Pretty big, but no. Amazon? Lots and lots of servers, but not even close. Microsoft? They're just getting started. Household names all, but their capacity pales to that of the biggest cloud on the planet, the network of computers...
on
25 Mar 2010
Blog Post:
High-Tech Copy Machines a Gold Mine for Data Thieves
Microsoft Swiss Security Team
Victor Beitner, a security expert who reconfigures photocopy machines destined for resale in Toronto, says businesses are completely unaware of the potential information security breach when the office photocopier is replaced. They think the copier is just headed for a junkyard but, in most cases...
on
20 Mar 2010
Blog Post:
Future Phishing
Microsoft Swiss Security Team
Forget the Nigerian prince. Phishing scams are moving beyond the misspelled, far-fetched ruses that clog your in-box and beg for your bank codes. In the year to come, security professionals are warning of bank code-stealing exploits that are much slicker and more convincing--hidden in guises as harmless...
on
29 Dec 2007
Blog Post:
New Phishing/Storm Worm Variant Spreading
Microsoft Swiss Security Team
US-CERT has received reports of new phishing activity, some of which has been linked to Storm Worm. The latest activity is centered around messages related to the recent earthquake in China and the upcoming Olympic Games. This Trojan is spread via an unsolicited email message that contains a link to...
on
25 Jun 2008
Blog Post:
Microsoft Botnet-hunting Tool Helps Bust Hackers
Microsoft Swiss Security Team
Botnet fighters have another tool in their arsenal, thanks to Microsoft. Microsoft is giving law enforcers access to a special tool that keeps tabs on botnets, using data compiled from the 450 million computer users who have installed the Malicious Software Removal tool that ships with Windows. ...
on
27 May 2008
Blog Post:
The evolution of CyberCrime Inc
Microsoft Swiss Security Team
There is no storefront or corporate headquarters for Cybercrime Inc., but savvy salesmen in a murky, borderless economy are moving merchandise by shilling credit card numbers - "two for the price one." "Sell fresh CC," promised one salesman who offered teaser credit card numbers for samples in New...
on
11 Apr 2008
Blog Post:
IC3's 2007 Internet Crime Report
Microsoft Swiss Security Team
The USA's Internet Crime Complaint Center (IC3) is a partnership between the FBI and the National White Collar Crime Center (NW3C). Last week, the IC3 released its annual report for 2007. You can download a copy from here . From F-Secure: Malicious software and frauds are very closely related. Malware...
on
10 Apr 2008
Blog Post:
Internet Phone Systems Become the Fraudster's Tool
Microsoft Swiss Security Team
Cyber criminals have found a new launching pad for their scams: the phone systems of small- and medium-sized businesses across the U.S. In recent weeks, they have hacked into dozens of telephone systems across the country, using them as a way to contact unsuspecting bank customers and trick them into...
on
2 Nov 2009
Blog Post:
A group of 15 Nations agree to start working together to reduce Cyberwarfare Threat
Microsoft Swiss Security Team
[The Washington Post] A group of nations — including the United States, China and Russia — have for the first time signaled a willingness to engage in reducing the threat of attacks on each other’s computer networks. http://www.washingtonpost.com/wp-dyn/content/article/2010/07/16...
on
21 Jul 2010
Blog Post:
Slow And Silent Targeted Attacks On The Rise
Microsoft Swiss Security Team
And another one in the same direction: The most determined cyber criminals don't necessarily work fast when they breach a network, and their infiltration is often silent and undetectable. But it's this brand of "low and slow" targeted attack that can also be the most deadly, security experts say:...
on
12 Jan 2009
Blog Post:
Thoughts of a Teenage Bot Master
Microsoft Swiss Security Team
One day in May 2005, a 16-year-old hacker named "SoBe" opened his front door to find a swarm of FBI agents descending on his family's three-story house in Boca Raton, Florida. With an arm and leg in casts from a recent motorcycle accident, one agent grabbed his good arm while others seized thousands...
on
27 May 2008
Blog Post:
Microsoft Malware Removal Tool: Two million password stealers fingered
Microsoft Swiss Security Team
Microsoft's Malicious Software Removal Tool - a program that removes malware from Windows machines - detected password-stealing software from more than 2 million PCs in the first week after it was updated. One password stealer, called Taterf, alone was detected on 700,000 computers in the first day...
on
25 Jun 2008
Blog Post:
A guide to basic computer forensics
Microsoft Swiss Security Team
While some investigations rely on highly trained professionals using expensive tools and complex techniques, there are easier, cheaper methods you can use for basic investigation and analysis. In this article, we will focus on computer forensic techniques that are readily accessible to you as a mainstream...
on
12 Mar 2008
Blog Post:
OECD: Malicious Software (Malware): A Security Threat to the Internet Economy
Microsoft Swiss Security Team
Excerpt: This report, developed in collaboration with experts, aims to inform policy makers about malware impacts, growth and evolution, and countermeasures to combat malware. It seeks to analyze some of the main issues associated with malware and to explore how the international community can better...
on
14 Jun 2008
Blog Post:
Microsoft Unveils One-Stop Service for Reporting Stolen Accounts
Microsoft Swiss Security Team
Microsoft on Thursday unveiled a program to alert banks and online services when accounts they oversee are compromised. The Internet Fraud Alert will serve as a centralized repository for stolen account credentials and personal information, Microsoft said in a press release announcing the system. ...
on
18 Jun 2010
Blog Post:
Judge: Man can't be forced to divulge encryption passphrase
Microsoft Swiss Security Team
Interesting... also how that wouldbe handled outside of the US. A federal judge in Vermont has ruled that prosecutors can't force a criminal defendant accused of having illegal images on his hard drive to divulge his PGP (Pretty Good Privacy) passphrase. U.S. Magistrate Judge Jerome Niedermeier ruled...
on
21 Dec 2007
>