TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support options
For small and midsize businesses
For enterprises
For developers
For IT professionals
From partners
For technical support
Support offerings
For home users
More support
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Microsoft Switzerland Security Blog
Security informations brought to you by the Swiss Security Team.
Tags
Antimalware
Backup
Cloud
Consumer
Developer
email
Enterprise
Forensic
Fun
Guidance
Identity and Access Management
IE
Law Enforcment
Mobile
Network
Office
OS
PKI
Policy
SQL
Strategy
Survey
trends
Virtualization
WiFi
Windows
Browse by Tags
TechNet Blogs
»
Microsoft Switzerland Security Blog
»
All Tags
»
trends
Related Posts
Blog Post:
Covert channel vulnerabilities in anonymity systems
Microsoft Swiss Security Team
Excerpt: The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protect users’ privacy by restricting unauthorized access to their identity. This requirement can be considered as a flow control policy in the well established field of multilevel secure systems. I...
on
14 Jun 2008
Blog Post:
Windows 7 Security Story May Appeal to Enterprises
Microsoft Swiss Security Team
The Windows 7 security story has three main chapters that have received a fair amount of attention: DirectAccess, BitLocker To Go, and AppLocker. With these, as well as features such as BranchCache and enhancements to UAC (user account control), officials at Microsoft have said they feel they are pushing...
on
2 Nov 2009
Blog Post:
Ballmer Outlines Vision For Next Computing Revolution
Microsoft Swiss Security Team
The rise of PCs, graphical user interfaces, the Internet, and Web 2.0 technologies have obviously had major impacts on the IT industry, but according to Microsoft (NSDQ:MSFT) CEO Steve Ballmer, the computing revolution that's about to take place will tie up all the loose ends from previous ones. In...
on
10 Mar 2008
Blog Post:
Windows 7 almost five times more secure than XP
Microsoft Swiss Security Team
CNET: Windows 7 almost five times more secure than XP Those are the findings of Microsoft's latest Security Intelligence Report, which detailed in depth the state of software vulnerabilities, exploits, security breaches, and malware in 2010. http://news.cnet.com/8301-1009_3-20063220-83.html#ixzz1MXpezMKz...
on
17 May 2011
Blog Post:
Big trouble with teen hackers
Microsoft Swiss Security Team
Teenagers, including children as young as eleven and twelve years old, are increasingly becoming involved in serious cyber-criminal activity that exposes themselves and the users they target to a full range of dangerous repercussions. "Most have absolutely no idea of what getting they're into, they...
on
7 Feb 2008
Blog Post:
Are criminal to criminal (C2C) networks making cyber crime too easy?
Microsoft Swiss Security Team
With the FBI's announcement of Operation Bot Roast II detailing the arrests of several bot-herders infecting computer systems on an International basis, it's become apparent that a lot of crime is going on with the click of a mouse. One of the more amazing revelations to come forward from Operation Bot...
on
12 Dec 2007
Blog Post:
Trojans Dominated Malware Threats in Dec. '08
Microsoft Swiss Security Team
Sunbelt Software has released its monthly data dump that charts the most commonly observed malware and spyware threats, and, as has been the case for a good while, trojan attacks continued to lead the way across the Top Ten rankings during Dec. 2008. http://securitywatch.eweek.com/exploits_and_attacks...
on
12 Jan 2009
Blog Post:
E-mail typosquatting poses leakage threat
Microsoft Swiss Security Team
Companies and political organizations should put more effort into registering mis-typed versions of their primary domain, not only to protect visitors to their Web sites but also to prevent e-mails from accidentally leaking out, a security researcher said on Wednesday. http://www.securityfocus.com...
on
28 Feb 2008
Blog Post:
Technology as a Substitute for the IT Security Pro?
Microsoft Swiss Security Team
"We are providing a technical solution that will eliminate the need for a lot of cyber professionals because we just don't have enough of them," Zalmai Azmi says. Can technology replace the IT security professional to safeguard government information systems? http://www.govinfosecurity.com/articles...
on
6 Feb 2010
Blog Post:
The Biggest Cloud on the Planet is Owned by ... the Crooks!
Microsoft Swiss Security Team
Network World: Who's got the biggest cloud in the tech universe? Google? Pretty big, but no. Amazon? Lots and lots of servers, but not even close. Microsoft? They're just getting started. Household names all, but their capacity pales to that of the biggest cloud on the planet, the network of computers...
on
25 Mar 2010
Blog Post:
One-fifth of Windows apps go unpatched
Microsoft Swiss Security Team
Updates are available, but users haven't installed them, says Secunia. One in five applications installed on Windows PCs are missing security patches, a Copenhagen-based vulnerability tracker has reported. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9054502&source...
on
29 Dec 2007
Blog Post:
Hold on to Your Keys!
Microsoft Swiss Security Team
There have been a few recent incidents of what we previously thought was extremely rare — malware authors using code signing certificates that were issued to companies with good reputations. The high-profile Stuxnet incident included validly signed malware with misappropriated Authenticode certificates...
on
21 Sep 2010
Blog Post:
Newest Security Reports Show Changing Threats
Microsoft Swiss Security Team
Scott Hogg, Core Networking and Security: "I find it useful to seek out new perspectives on the ever-changing security realm. By reviewing these [security] reports, we can gain a greater understanding of the emerging Internet threats our organizations are facing." Includes links to various security...
on
20 Mar 2010
Blog Post:
Virtualization: What are the security risks?
Microsoft Swiss Security Team
Virtualization will become dominant in enterprises, but the security risks are fuzzy at best. Meanwhile, the usual defense–firewalls, security appliances and such aren’t ready for virtualization. http://blogs.zdnet.com/security/?p=821 Urs
on
29 Jan 2008
Blog Post:
Enterprise@Risk: 2007 Privacy & Data Protection Survey
Microsoft Swiss Security Team
Reportable and multiple privacy breaches rising at alarming rate! Personally identifiable information of customers and employees is being exposed – frequently and repeatedly – potentially putting hundreds of thousands of individuals at risk and exposing organizations to increased liability, according...
on
17 Dec 2007
Blog Post:
The Phishing Guide: Understanding and Preventing Phishing Attacks
Microsoft Swiss Security Team
This paper [PDF] covers the technologies and security flaws phishers exploit to conduct their attacks, and provides detailed vendor-neutral advice on what organisations can do to prevent future attacks. Security professionals and customers can use this comprehensive analysis to arm themselves against...
on
5 Sep 2009
Blog Post:
The Great Debate: Security by Obscurity
Microsoft Swiss Security Team
Security by obscurity is, in a nutshell, a violation of Kerckhoffs' Principle, which holds that a system should be secure because of its design, not because the design is unknown to an adversary. The basic premise of Kerckhoffs' Principle is that secrets don't remain secret for very long. Debate by...
on
26 May 2008
Blog Post:
So Much Data, So Little Encryption
Microsoft Swiss Security Team
If you go solely by top-level stats on encryption use, you'll come away feeling pretty secure — 86 percent of the 499 business technology professionals responding to our InformationWeek Analytics State of Encryption Survey employ encryption of some type. But that finding doesn't begin to tell the real...
on
27 Nov 2009
Blog Post:
Microcosm of a massive security problem
Microsoft Swiss Security Team
Blog Post by Jon Oltsik: A few weeks ago, I gave a presentation to a number of companies about the future of endpoint security. During this presentation, I had the opportunity to ask these folks a number of questions about their IT infrastructure and their plans for it. There were only about 20 organizations...
on
23 Oct 2008
Blog Post:
Microsoft Files Patent for HoneyMonkey Exploit Finder
Microsoft Swiss Security Team
Microsoft has filed a patent claim for the Strider HoneyMonkey malware/exploit detection system created by our internal research unit. The claim, currently being reviewed at Peer-to-Patent. The HoneyMonkey system, first discussed in August 2005, is best described as an automated Web patrol that uses...
on
29 Dec 2007
Blog Post:
Future Phishing
Microsoft Swiss Security Team
Forget the Nigerian prince. Phishing scams are moving beyond the misspelled, far-fetched ruses that clog your in-box and beg for your bank codes. In the year to come, security professionals are warning of bank code-stealing exploits that are much slicker and more convincing--hidden in guises as harmless...
on
29 Dec 2007
Blog Post:
Malvertising
Microsoft Swiss Security Team
Malvertising (malicious advertising) is a reasonably fresh take on an online criminal methodology that appears focused on the installation of unwanted or outright malicious software through the use of internet advertising media networks, exchanges and other user supplied content publishing services common...
on
10 Dec 2007
Blog Post:
3.7 Billion Phishing Emails were sent in the last 12 Months
Microsoft Swiss Security Team
[Network World] Cyber criminals sent 3.7 billion phishing emails over the last year, in a bid to steal money from unsuspecting web users, says CPP. Research by the life assistance company revealed that 55 percent of phishing scams are fake bank emails, which try and dupe web users into giving hackers...
on
18 Jun 2010
Blog Post:
Phishing, Worms Spike This Year, Say Microsoft and McAfee
Microsoft Swiss Security Team
Scammers are targeting social networks with phishing scams and relying more heavily on worms and Trojans to attack computers, according to security trend reports to be released Monday by Microsoft and McAfee. http://news.cnet.com/8301-27080_3-10387768-245.html The Microsoft Security Intelligence...
on
3 Nov 2009
Blog Post:
Where in the World do Viruses come from?
Microsoft Swiss Security Team
The U.S. continues to dominate as the main source of the world's viruses, producing 15.9 percent of all viruses. It is followed closely by Brazil, which produces 14.5 percent (similar levels to last month's 14.1 percent). You can see more about virus trends from the Microsoft Security Intelligence...
on
17 Sep 2009
<
>