Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: China running out of IP addresses

    Chinese officials are calling for a mass migration to IPv6 after disclosing that they have only 830 days' worth of IPv4 resources left. Around 80 per cent of China's IPv4 resources have now been taken up. The country's IP allocation recently exceeded Japan's, making it the second largest in the world...
  • Blog Post: Cisco hops onto patching treadmill

    Cisco has taken a leaf out of Microsoft's book by adopting a regular patch release cycle. However, the change will apply only to security bugs involving its core IOS software and not all its products. Starting on 26 March, Cisco will release bundles of IOS security advisories on the fourth Wednesday...
  • Blog Post: Cybersecurity Today: The Wild, Wild West

    If you purchased a brand new computer today with all the latest security software and plug it into the Internet, how long would it be before the first hacker probed it? Answer : About four hours... http://www.newsfactor.com/story.xhtml?story_id=12100CEDYE09 Probing? 4 hours? I attached lately a...
  • Blog Post: Microsoft Forefront Integration Kit for Network Access Protection

    The Microsoft Forefront Integration Kit for Network Access Protection provides a way for two Microsoft technologies to work together: Forefront Client Security and Network Access Protection (NAP). Forefront Client Security is comprehensive anti-malware software from Microsoft that provides unified protection...
  • Blog Post: Cisco's (and other's) backdoor for Hackers

    Activists have long grumbled about the privacy implications of the legal backdoors that networking companies like Cisco build into their equipment — functions that let law enforcement quietly track the Internet activities of criminal suspects. Now an IBM researcher has revealed a more serious problem...
  • Blog Post: Anti-DoS Dynamic IP Restrictions for IIS 7.0 Hits Beta2

    Microsoft has made available for download the second Beta development milestone of an anti-DoS extension for version 7.0 of Internet Information Services [IIS]. The Microsoft Dynamic IP Restrictions for IIS 7.0 has reached Beta2 and is up for grabs via the Microsoft Download Center in two flavors, 32...
  • Blog Post: How Wi-Fi Attackers are poisoning web browsers

    Public Wi-Fi networks such as those in coffee shops and airports present a bigger security threat than ever to computer users because attackers can intercede over wireless to poison users' browser caches in order to present fake Web pages or even steal data at a later time. That’s according to security...
  • Blog Post: Researchers Find a New Way to Attack the Cloud

    Amazon and Microsoft have been pushing cloud-computing services as a low-cost way to outsource raw computing power, but the products may introduce new security problems that have yet to be fully explored, according to researchers at the University of California, San Diego, and the Massachusetts Institute...
  • Blog Post: A strong Password isn’t the strongest Security

    Make your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it — never write it down. And, oh yes, change it every few months... Yes, that's it? Or not? "Keeping a keylogger off your machine is about a trillion times more important than the strength...
  • Blog Post: Step by step instructions on how to build a UAG SP1 DirectAccess lab with NAP

    Good article and step by step instruction on simplifying DA/NAP deployments with UAG: http://www.windowsecurity.com/articles/Integrated-NAP-Functionality-UAG-2010-Service-Pack1-DirectAccess.html - Urs
  • Blog Post: Seattle Tops List of Riskiest Cyber Crime Cities!

    MSNBC:Seattle is the riskiest online city, according to a new survey. Symantec says Seattle tops the list because people are more likely to access the Web each day and use the Internet for shopping and banking, and because of the proliferation of wireless Internet access. http://www.msnbc.msn.com...
  • Blog Post: Guidelines for the Secure Deployment of IPv6 (Draft)

    [NIST] With the dwindling number of IPv4 addresses, the Office of Management and Budget (OMB) mandated that U.S. federal agencies begin using the IPv6 protocol. This document provides guidelines for organizations to securely deploy IPv6. http://csrc.nist.gov/publications/drafts/800-119/draft-sp800...
  • Blog Post: Microsoft Security Compliance Manager released

    The Security Compliance Manager will help you accelerate knowledge to merge best practices, customize once to centralize decision making, and export to multiple formats to enable monitoring, verification, and compliance. The tool is designed to help accelerate your organization’s ability to efficiently...
  • Blog Post: Anatomy of a SQL Injection Incident

    Blog Posting from Neil Carpenter: "A number of people are reporting that 10K+ Web sites have been hacked via a SQL injection attack that injected a link to a malicious .js file into text fields in their database. Since the CSS Security team here at Microsoft worked with several of these incidents...
  • Blog Post: The Biggest Cloud on the Planet is Owned by ... the Crooks!

    Network World: Who's got the biggest cloud in the tech universe? Google? Pretty big, but no. Amazon? Lots and lots of servers, but not even close. Microsoft? They're just getting started. Household names all, but their capacity pales to that of the biggest cloud on the planet, the network of computers...
  • Blog Post: Newest Security Reports Show Changing Threats

    Scott Hogg, Core Networking and Security: "I find it useful to seek out new perspectives on the ever-changing security realm. By reviewing these [security] reports, we can gain a greater understanding of the emerging Internet threats our organizations are facing." Includes links to various security...
  • Blog Post: Where in the World do Viruses come from?

    The U.S. continues to dominate as the main source of the world's viruses, producing 15.9 percent of all viruses. It is followed closely by Brazil, which produces 14.5 percent (similar levels to last month's 14.1 percent). You can see more about virus trends from the Microsoft Security Intelligence...
  • Blog Post: New Phishing/Storm Worm Variant Spreading

    US-CERT has received reports of new phishing activity, some of which has been linked to Storm Worm. The latest activity is centered around messages related to the recent earthquake in China and the upcoming Olympic Games. This Trojan is spread via an unsolicited email message that contains a link to...
  • Blog Post: Windows 7 Security Primer

    Good series of articles about Windows 7 security: http://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part1.html http://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part2.html http://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part3.html These articles cover...
  • Blog Post: Internet Phone Systems Become the Fraudster's Tool

    Cyber criminals have found a new launching pad for their scams: the phone systems of small- and medium-sized businesses across the U.S. In recent weeks, they have hacked into dozens of telephone systems across the country, using them as a way to contact unsuspecting bank customers and trick them into...
  • Blog Post: C64 as a webserver?! ;-)

    An entire Web site has been 100% developed on the Commodore 64. The little keyboard box you see there and that big huge disk drive is where the Web page is stored. So… if it takes a while for the Web site to load on your computer, especially the picture, remember the computer is only 1 Mhz in speed and...
  • Blog Post: New Zlob variant reconfigures routers

    A variant of the Zlob virus has emerged that can tweak DNS entries on standard commercial routers from an infected Windows PC. It uses a built-in list of standard router usernames and passwords. Successful attacks have already been observed on Linksys BEFSX41 routers and a Buffalo router using DD-WRT...
  • Blog Post: Microsoft ISA Server Service Pack 1 (SP1) released

    List of problems that are fixed in Internet Security and Acceleration Server 2006 Service Pack 1: http://support.microsoft.com/kb/943462 Microsoft Internet Security and Acceleration Server 2006 Service Pack 1 document http://download.microsoft.com/download/6/6/6/6662d14d-52c3-445d-b9d1-6e373171f769...
  • Blog Post: Microsoft ISA Server not really a firewall?

    From time to time, I have discussions about Microsoft Internet Acceleration Server (ISA) with people questioning if ISA is a real Firewall product. Many companies use ISA server, but as a proxy server or to protect their Windows servers (publishing exchange, etc.) only. In this cases, they put another...
  • Blog Post: Microsoft calls for talks on Internet trust, safety

    Microsoft today called for broad discussions about the safety of the Internet in an initiative it dubbed "End to End Trust" in a white paper released during the RSA Conference that opened today in San Francisco. In a keynote address at the security conference, Craig Mundie, chief research and strategy...