Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: Microsoft cloud-computing service offers federal agencies

    New Microsoft cloud-computing service offers federal agencies a high level of security, including biometric access control and fingerprinting for background checks. http://news.cnet.com/8301-27080_3-10459301-245.html?part=rss&subj=news&tag=2547-1_3-0-20 -Urs
  • Blog Post: Top 9 Dirty Tricks Scammers Use

    What the average guy might call a con is known in the security world as social engineering. Social engineering is the criminal art of scamming a person into doing something or divulging sensitive information. These days, there are thousands of ways for con artists to pull off their tricks. Here we look...
  • Blog Post: MS: What We Know (and Learned) from the Waledac Takedown

    Very interesting article from the MSRC: Recently, following an investigation to which various members of the MMPC contributed, Microsoft’s Digital Crimes Unit initiated a takedown of the Waledac botnet in an action known as Operation b49, an ongoing operation to disrupt the botnet for the long term....
  • Blog Post: Report details hacks targeting Google and others

    It’s been three weeks since Google announced that a sophisticated and coordinated hack attack dubbed Operation Aurora recently targeted it and numerous other U.S. companies. Now a leading computer forensic firm is providing the closest look so far at the nature of the attacks, and attackers that struck...
  • Blog Post: Hacking Your Life (oh oh...)

    A Virginia woman discovered that her married boyfriend had other girlfriends, and she decided to seek revenge online. According to federal prosecutors, she hired computer hackers to help. Elaine Cioni paid hackers $100 [U.S] for the password to her boyfriend’s AOL e-mail account, according to prosecutors...
  • Blog Post: Security guide to customs-proofing your laptop

    If you travel across national borders, it's time to customs-proof your laptop. Customs officials have been stepping up electronic searches of laptops at the border, where travelers enjoy little privacy and have no legal grounds to object. Laptops and other electronic devices can be seized without...
  • Blog Post: The Latest Microsoft Security Intelligence Report (v5)

    The Microsoft Security Intelligence Report (SIR) provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows users...
  • Blog Post: Pentagon Searches for ‘Digital DNA’ to Identify Hackers

    One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying to fix that, with a new effort to develop the “cyber equivalent of fingerprints or DNA” that can identify even the best-cloaked hackers. ...
  • Blog Post: Forensics Plan Guide (GIAC)

    The Forensics Plan Guide defines the basic elements of a Forensic Plan from the first initial contact through submission of the final Forensic Report. The document also includes 'The Forensic Cookbook' which illustrates the use of selected products and procedures, providing additional insight and configuration...