Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: 9 Ways to Increase the Security of Your Laptop While on the Road

    Using your laptop to get work done away from your office or on the road is becoming widely accepted. But this rapid growth in laptop computing has made portable systems the target for theft around the world. If your laptop computer is stolen, company information can be exposed, as well as your personal...
  • Blog Post: Windows Server 2008 Administrative Delegation Techniques

    Ever since Microsoft released Windows 2000 way back when, the options for delegating certain tasks have been available. The concepts of delegation can be a bit confusing, but in the core of what the delegation provides is essential to an efficient network. Without the use of delegations, you are stuck...
  • Blog Post: Using Autoplay on Vista To Stop Attacks (Islandhoping)

    The technique of island hopping—penetrating a network through a weak link and then hopping around systems within that network—has been around for years. But it continues to take on new dimensions. In today's security-conscious IT environments, people are often the weakest link, and malicious users are...
  • Blog Post: THE CABLE GUY: Network Policy Server

    Nothing’s more critical to the health of your enterprise than a secure network, and Network Policy Server (NPS), new in Windows Server 2008, is an important tool for managing access. It lets you implement organization-wide policies, providing centralized authentication, authorization, and accounting...
  • Blog Post: One-fifth of Windows apps go unpatched

    Updates are available, but users haven't installed them, says Secunia. One in five applications installed on Windows PCs are missing security patches, a Copenhagen-based vulnerability tracker has reported. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9054502&source...
  • Blog Post: New Microsoft Security Vulnerability Research and Defense blog

    The Security Vulnerability Research & Defense blog’s intent is to provide more information about Microsoft vulnerabilities, mitigations and workarounds, and active attacks. http://blogs.technet.com/swi/ Urs
  • Blog Post: Newest Security Reports Show Changing Threats

    Scott Hogg, Core Networking and Security: "I find it useful to seek out new perspectives on the ever-changing security realm. By reviewing these [security] reports, we can gain a greater understanding of the emerging Internet threats our organizations are facing." Includes links to various security...
  • Blog Post: So Much Data, So Little Encryption

    If you go solely by top-level stats on encryption use, you'll come away feeling pretty secure — 86 percent of the 499 business technology professionals responding to our InformationWeek Analytics State of Encryption Survey employ encryption of some type. But that finding doesn't begin to tell the real...
  • Blog Post: Microsoft Files Patent for HoneyMonkey Exploit Finder

    Microsoft has filed a patent claim for the Strider HoneyMonkey malware/exploit detection system created by our internal research unit. The claim, currently being reviewed at Peer-to-Patent. The HoneyMonkey system, first discussed in August 2005, is best described as an automated Web patrol that uses...
  • Blog Post: Where in the World do Viruses come from?

    The U.S. continues to dominate as the main source of the world's viruses, producing 15.9 percent of all viruses. It is followed closely by Brazil, which produces 14.5 percent (similar levels to last month's 14.1 percent). You can see more about virus trends from the Microsoft Security Intelligence...
  • Blog Post: Black Hat: new operating systems security metric

    At the Black Hat Security Conference currently taking place in Amsterdam, researchers from the Zurich ETH (Swiss Federal Institute of Technology) have reported a new model for determining the security of operating systems. They don't just count the number of holes and how critical they are, but also...
  • Blog Post: Windows 7 Security Primer

    Good series of articles about Windows 7 security: http://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part1.html http://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part2.html http://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part3.html These articles cover...
  • Blog Post: Microsoft support lifecycle for service Packs

    Perhaps a good idea to do some end-of-year cleanup! You can find what product services packs are supported here: http://support.microsoft.com/gp/lifesupsps Urs
  • Blog Post: C64 as a webserver?! ;-)

    An entire Web site has been 100% developed on the Commodore 64. The little keyboard box you see there and that big huge disk drive is where the Web page is stored. So… if it takes a while for the Web site to load on your computer, especially the picture, remember the computer is only 1 Mhz in speed and...
  • Blog Post: Microsoft adds new Anti-Exploit APIs into Windows

    Microsoft has announced plans to add new anti-exploitation APIs into Windows Vista SP1, Windows XP SP3 and Windows Server 2008 as part of a larger plan to secure the Windows ecosystem. According to Michael Howard, a senior program manager in Microsoft's security unit, the delivery of the new APIs...
  • Blog Post: Windows 7 and Security

    As Windows 7 is not too far away and as many are allready using or testing Windows 7, here a list of interesting documentation: What's New in Windows 7 for IT Pros (Beta) http://technet.microsoft.com/de-de/library/dd349334(en-us).aspx Windows 7 Security Enhancements http://technet.microsoft.com...
  • Blog Post: Slow And Silent Targeted Attacks On The Rise

    And another one in the same direction: The most determined cyber criminals don't necessarily work fast when they breach a network, and their infiltration is often silent and undetectable. But it's this brand of "low and slow" targeted attack that can also be the most deadly, security experts say:...
  • Blog Post: Windows Vista SP1 documentation

    Windows Vista Service Pack 1 (Generic Overview and entry point) http://technet2.microsoft.com/WindowsVista/en/library/90a564b9-34af-4a6b-937f-324e1862244b1033.mspx?mfr=true Some interesting topics out of the hole documentation: Overview of Windows Vista Service Pack 1 When developing Windows Vista...
  • Blog Post: Security Guru Calls Chrome OS's Security Claims "Idiotic"

    Noted security guru Bruce Schneier, chief technologist at BT, has scoffed at Google's claims about its new OS, just announced yesterday. According to the Google blog post, Chrome OS represents a complete redesign of the underlying security architecture of the OS "so that users don't have to deal with...
  • Blog Post: Security for the youngest internet users - Security4Kids

    Have you ever heard about www.security4kids.ch ? If not, visiting the site should be one of your tasks for today! Especially if you’ve got children aged 7-15 yourself. But let’s go back to the beginning. The website www.security4kids.ch (in German and French and soon also in Italian) was launched...
  • Blog Post: Black Hat: Who patches security holes faster, Microsoft or Apple?

    Apple's teasing commercials that imply its software is safer than Microsoft's may not quite match the facts, according to new research revealed at the Black Hat conference on Thursday. Researchers from the Swiss Federal Institute of Technology looked at how many times over the past six years the two...
  • Blog Post: Tech Insight: Microsoft's IPSec and NAP/NAC

    Windows' built-in security capabilities offer endpoint alternative to NAP/NAC Microsoft’s support of the IP Security (IPSec) standard was enhanced with the release of Windows Vista this year, and interest in the technology will likely grow with the introduction of Windows 2008. For smaller organizations...
  • Blog Post: A guide to basic computer forensics

    While some investigations rely on highly trained professionals using expensive tools and complex techniques, there are easier, cheaper methods you can use for basic investigation and analysis. In this article, we will focus on computer forensic techniques that are readily accessible to you as a mainstream...
  • Blog Post: Draft guidance for securing servers (NIST)

    The National Institute of Standards and Technology is seeking comment on its draft guidelines for securing servers, released this week. NIST Special Publication 800-123, "Guide to General Server Security," makes recommendations for securing server operating systems and software in addition to maintaining...
  • Blog Post: Virtual machines aren't really more secure

    Roger A. Grimes: "I've been at several recent conferences where virtual machine (VM) and security “experts” were telling audiences how VM technology can be used to improve computer security. Wow! They are either drunk on the marketing Kool-Aid, misinformed, or simply trying to misrepresent VM capabilities...