Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: APWG Releases Phishing Activity Trends

    The Anti-Phishing Working Group (APWG) has just released their Phishing Activity Trends Report for the month of December. Overall, the report showed a decrease in activity from the previous month; however, there were a few notable exceptions. It appears the number of unique phishing sites has increased...
  • Blog Post: Study: 73% use Bank Password everywhere

    For years computer security experts have been preaching that users should never share the same password across their connected lives — at online banking sites, at Amazon, on their Web mail services, even on their cell phones. Apparently, most people ignore that advice. It really can't be repeated...
  • Blog Post: Identity management critical for security, government IT shops say

    A majority of government IT organizations say identity management is very important to securing their networks and will become even more so over the next five years, but that funding to keep pace is a major impediment to growth. The respondents also said they think identity management is relevant...
  • Blog Post: Europe still top source of spam

    European spam networks have pumped out more unsolicited e-mail than those in the U.S. for the third month in a row, according to security vendor Symantec. Symantec called this a "significant shift" in spam trends as, historically, compromised U.S. computers have been used to send spam, and many spammers...
  • Blog Post: Survey Finds that 54% of Wireless Users Steal Wi-Fi Access

    Security firm Sophos reported that 54% of wireless users interviewed have admitted to using someone else's wireless Internet access. In a report, done by the firm on behalf of The Times, many Wi-Fi users fail to properly secure their wireless connection with passwords and encryption, allowing passers...
  • Blog Post: Consumers strongly prefer to buy from companies that have not suffered data leaks, losses or theft

    Consumers strongly prefer to buy from companies that have not suffered data leaks, losses or theft, according to a new survey conducted for Check Point Software Technologies Ltd. The Check Point & YouGov survey of over 2100 British consumers highlighted how consumers’ trust of a company and its brand...
  • Blog Post: Don't blame 'stupid users' for data breaches

    Security breaches that can be traced back to the actions of one individual are not the fault of one "stupid" employee but rather a failure to educate and engage the whole workforce around the importance of good security practice, according to a leading academic. Speaking at the Cyber Warfare 2008...
  • Blog Post: Seattle Tops List of Riskiest Cyber Crime Cities!

    MSNBC:Seattle is the riskiest online city, according to a new survey. Symantec says Seattle tops the list because people are more likely to access the Web each day and use the Internet for shopping and banking, and because of the proliferation of wireless Internet access. http://www.msnbc.msn.com...
  • Blog Post: Big trouble with teen hackers

    Teenagers, including children as young as eleven and twelve years old, are increasingly becoming involved in serious cyber-criminal activity that exposes themselves and the users they target to a full range of dangerous repercussions. "Most have absolutely no idea of what getting they're into, they...
  • Blog Post: Trojans Dominated Malware Threats in Dec. '08

    Sunbelt Software has released its monthly data dump that charts the most commonly observed malware and spyware threats, and, as has been the case for a good while, trojan attacks continued to lead the way across the Top Ten rankings during Dec. 2008. http://securitywatch.eweek.com/exploits_and_attacks...
  • Blog Post: One-fifth of Windows apps go unpatched

    Updates are available, but users haven't installed them, says Secunia. One in five applications installed on Windows PCs are missing security patches, a Copenhagen-based vulnerability tracker has reported. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9054502&source...
  • Blog Post: Microcosm of a massive security problem

    Blog Post by Jon Oltsik: A few weeks ago, I gave a presentation to a number of companies about the future of endpoint security. During this presentation, I had the opportunity to ask these folks a number of questions about their IT infrastructure and their plans for it. There were only about 20 organizations...
  • Blog Post: Where in the World do Viruses come from?

    The U.S. continues to dominate as the main source of the world's viruses, producing 15.9 percent of all viruses. It is followed closely by Brazil, which produces 14.5 percent (similar levels to last month's 14.1 percent). You can see more about virus trends from the Microsoft Security Intelligence...
  • Blog Post: US State Department issues Top 10 list of security threats for US businesses

    THE ASSOCIATED PRESS/WASHINGTON - U.S. businesses faced varied threats in 2007 - including cyberattacks in Europe, theft of intellectual property in Asia, natural disasters in Latin America, terrorism on many continents - according to a year-end analysis by the U.S. State Department's Overseas Security...
  • Blog Post: IC3's 2007 Internet Crime Report

    The USA's Internet Crime Complaint Center (IC3) is a partnership between the FBI and the National White Collar Crime Center (NW3C). Last week, the IC3 released its annual report for 2007. You can download a copy from here . From F-Secure: Malicious software and frauds are very closely related. Malware...
  • Blog Post: Slow And Silent Targeted Attacks On The Rise

    And another one in the same direction: The most determined cyber criminals don't necessarily work fast when they breach a network, and their infiltration is often silent and undetectable. But it's this brand of "low and slow" targeted attack that can also be the most deadly, security experts say:...
  • Blog Post: Security is no match for chocolate and good looking women

    A survey out today by the organizers of the tech-security conference Infosecurity Europe found that 21% of 576 London office workers stopped on the street were willing to share their computer passwords with a good looking woman holding a clipboard. People were offered a chocolate bar in exchange for...
  • Blog Post: Black Hat: Who patches security holes faster, Microsoft or Apple?

    Apple's teasing commercials that imply its software is safer than Microsoft's may not quite match the facts, according to new research revealed at the Black Hat conference on Thursday. Researchers from the Swiss Federal Institute of Technology looked at how many times over the past six years the two...
  • Blog Post: Top 100 Virus-Infected Web Sites Exposed

    Simply visiting one of the "Top 100 Dirtiest" Web sites - without downloading or even clicking anything - could expose your computer to infection and put your personal information into the hands of criminals, anti-virus software company Norton Symantec said. http://www.smh.com.au/technology/technology...
  • Blog Post: Remote Workers Still Living Dangerously, Cisco Study Says

    If it seems that -- despite your company's best efforts to educate users about security -- users are actually behaving less responsibly, don't panic. Your organization isn't the only one. In fact, Cisco Systems Inc. today is releasing the results of a disturbing third-party study it commissioned over...
  • Blog Post: OECD: Malicious Software (Malware): A Security Threat to the Internet Economy

    Excerpt: This report, developed in collaboration with experts, aims to inform policy makers about malware impacts, growth and evolution, and countermeasures to combat malware. It seeks to analyze some of the main issues associated with malware and to explore how the international community can better...
  • Blog Post: Microsoft Forefront Client Security benchmark test (West Coast Lab)

    Microsoft Corporation commissioned West Coast Labs (WCL) to carry out a series of performance benchmarking tests and metric-based process evaluations of the following products: Microsoft Forefront Client Security McAfee Active VirusScan with McAfee ePO Symantec AntiVirus Corporate Edition...
  • Blog Post: Linux Web servers broken into most often

    Security portal Zone-H , which documents attacks on and defacements of Web pages, has compiled statistics about the attacks within the last year. Apparently, Linux servers were successfully defaced twice as often as Windows servers. Apache servers were defaced three times as often as Microsoft's IIS...
  • Blog Post: Study: Consumers Don't Use Anti-Phishing Defenses

    "Across the globe, Windows Internet Explorer 7 has more than 100 million users seeing green," VeriSign said in a press release about Extended Validation SSL technology earlier this month. About 5,000 sites are using the new technology, which gives users a "green bar" in their browsers when they prepare...
  • Blog Post: Security Risk as People Use Same Password on All Websites

    The research reveals that nearly half (46 percent) of Britons use the same password to login to their banking, shopping and social networking sites with a further 54 percent confessing to using variations of the same password. And with the average person visiting 23 different sites each month that require...