Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: APWG Releases Phishing Activity Trends

    The Anti-Phishing Working Group (APWG) has just released their Phishing Activity Trends Report for the month of December. Overall, the report showed a decrease in activity from the previous month; however, there were a few notable exceptions. It appears the number of unique phishing sites has increased...
  • Blog Post: China running out of IP addresses

    Chinese officials are calling for a mass migration to IPv6 after disclosing that they have only 830 days' worth of IPv4 resources left. Around 80 per cent of China's IPv4 resources have now been taken up. The country's IP allocation recently exceeded Japan's, making it the second largest in the world...
  • Blog Post: Internet Explorer 8 (beta2) released

    Last week Microsoft released IE8 Beta2, the faster, easier and safer successor of the existing Internet Explorer. As there are a lot of changes (new default settings, new support for standards, new features), it's definitely woth to try and test IE8. It's probably a good idea to start testing the own...
  • Blog Post: Fewer patches != safer OS

    Does one OS having fewer security patches than another operating system mean that the OS with the fewer patches is the safest OS? You know, I’m not sold on that concept. As we near the first anniversary of the consumer launch of Windows Vista we’ll be seeing pundits all over the media taking a look back...
  • Blog Post: A very long list of new Microsoft products for 2008...

    Bink.nu has an extensive list of new software that Microsoft will be unleashing in the marketplace. See yourself: http://blogs.technet.com/tarpara/archive/2007/12/25/microsoft-s-new-year-is-gonna-bring-a-lot-of-change.aspx Urs
  • Blog Post: Study: 73% use Bank Password everywhere

    For years computer security experts have been preaching that users should never share the same password across their connected lives — at online banking sites, at Amazon, on their Web mail services, even on their cell phones. Apparently, most people ignore that advice. It really can't be repeated...
  • Blog Post: Open-source projects certified as secure – huh?

    From the Blog of Michael Howard: I really got a chuckle out of this news item, especially this line: “Coverity, which creates automated source-code analysis tools, announced late Monday its first list of open-source projects that have been certified as free of security defects.” So we finally have...
  • Blog Post: Business biometrics raises ID theft risk

    The commercial use of biometrics will become widespread in five years, but is not without security risks The growing use of biometrics by businesses to identify individuals is insecure and in need of serious attention, according to one IT systems company. Fujitsu Siemens said that biometrics are...
  • Blog Post: Cybersecurity Today: The Wild, Wild West

    If you purchased a brand new computer today with all the latest security software and plug it into the Internet, how long would it be before the first hacker probed it? Answer : About four hours... http://www.newsfactor.com/story.xhtml?story_id=12100CEDYE09 Probing? 4 hours? I attached lately a...
  • Blog Post: New Method IDs Phishing, Malicious Domains

    At a closed-door security summit hosted on Yahoo’s Sunnyvale campus last week, a researcher demonstrated a new technique to more easily identify phishing and other malicious Websites. Dan Hubbard, vice president of security research for Websense, showed a tool Websense researchers have built that...
  • Blog Post: Minimizing User Rights Can Increase Security

    Taking a least-privilege approach to user accounts is a key part of any in-depth defense strategy, many analysts and security pros say. "I think it's very important … not even just as [a component] of security, but in the broader sense [of] risk posed to the business in IT," said Scott Crawford, an...
  • Blog Post: Identity management critical for security, government IT shops say

    A majority of government IT organizations say identity management is very important to securing their networks and will become even more so over the next five years, but that funding to keep pace is a major impediment to growth. The respondents also said they think identity management is relevant...
  • Blog Post: Europe still top source of spam

    European spam networks have pumped out more unsolicited e-mail than those in the U.S. for the third month in a row, according to security vendor Symantec. Symantec called this a "significant shift" in spam trends as, historically, compromised U.S. computers have been used to send spam, and many spammers...
  • Blog Post: How Wi-Fi Attackers are poisoning web browsers

    Public Wi-Fi networks such as those in coffee shops and airports present a bigger security threat than ever to computer users because attackers can intercede over wireless to poison users' browser caches in order to present fake Web pages or even steal data at a later time. That’s according to security...
  • Blog Post: CIA Monitors YouTube For Intelligence

    U.S. spies are looking increasingly online for intelligence and they've become major consumers of social media. In keeping with its mandate to gather intelligence, the CIA is watching YouTube. U.S. spies, now under the Director of National Intelligence (DNI), are looking increasingly online for intelligence;...
  • Blog Post: New Microsoft Windows cloud service for managing and securing PCs: Intune (Beta)

    Windows Intune Beta Windows Intune simplifies how businesses manage and secure PCs using Windows cloud services and Windows 7—so your computers and users can operate at peak performance, from virtually anywhere. Windows Intune is a comprehensive solution that includes PC management, malware protection...
  • Blog Post: Download: Windows Vista One Year Vulnerability Report

    Excerpt of a blog by Jeff Jones: Windows Vista shipped to business customers on the last day of November 2006, so the end of November 2007 marks the one year anniversary for supported production use of the product. This paper analyzes the vulnerability disclosures and security updates for the first...
  • Blog Post: Ninety-five percent of e-mails sent in 2007 are junk

    Barracuda Networks released its annual spam report, which shows between 90 to 95 percent of all e-mail sent in 2007 is spam. This is based on an analysis of more than 1 billion daily e-mail messages sent to its more than 50,000 customers worldwide. The above figures represent an increase from the...
  • Blog Post: Spyware authors offer dollars for downloads

    Spyware authors are offering financial rewards to botnet operators and other cyber-criminals who covertly install their spyware, security experts warned today. http://www.vnunet.com/vnunet/news/2212403/spyware-authors-offer-dollars Urs
  • Blog Post: To defeat a malicious botnet, build a friendly one

    Beating the "botnets"–armies of infected computers used to attack websites–requires borrowing tactics from the bad guys, say computer security researchers. A team at the University of Washington, US, wants to marshal swarms of good computers to neutralize the bad ones. They say their plan would be...
  • Blog Post: Consumers strongly prefer to buy from companies that have not suffered data leaks, losses or theft

    Consumers strongly prefer to buy from companies that have not suffered data leaks, losses or theft, according to a new survey conducted for Check Point Software Technologies Ltd. The Check Point & YouGov survey of over 2100 British consumers highlighted how consumers’ trust of a company and its brand...
  • Blog Post: New massive Botnet twice the size of Storm

    A new botnet twice the size of Storm has ballooned to an army of over 400,000 bots, including machines in the Fortune 500, according to botnet researchers at Damballa. The so-called Kraken botnet has been spotted in at least 50 Fortune 500 companies and is undetectable in over 80 percent of machines...
  • Blog Post: Why Technology Isn't The Answer To Better Security

    "Too many organizations still lack coherent, enforced and forward-thinking security processes, our survey shows. While 59 percent of respondents said they have an "overall information security strategy," that's up just two points from last year and it's not enough, says Mark Lobel, advisory services...
  • Blog Post: Web 2.0, meet Internet attack 2.0

    The glitzy, interactive abilities of Web 2.0 have led to a profusion of new applications, but the technology also is bringing a new era of security vulnerabilities, a security researcher warned Wednesday. "Security was a challenge to begin with, but if anything it's getting harder in the Web 2.0 world...
  • Blog Post: 'Out of office' messages turned into spam relays

    Spammers have found a new trick that gets around many current anti-spam filters: abusing the "out of the office" auto-respond feature found in legitimate webmail services. http://www.techworld.com/security/news/index.cfm?newsID=11544 Urs