Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: Covert channel vulnerabilities in anonymity systems

    Excerpt: The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protect users’ privacy by restricting unauthorized access to their identity. This requirement can be considered as a flow control policy in the well established field of multilevel secure systems. I...
  • Blog Post: Windows 7 Security Story May Appeal to Enterprises

    The Windows 7 security story has three main chapters that have received a fair amount of attention: DirectAccess, BitLocker To Go, and AppLocker. With these, as well as features such as BranchCache and enhancements to UAC (user account control), officials at Microsoft have said they feel they are pushing...
  • Blog Post: Ballmer Outlines Vision For Next Computing Revolution

    The rise of PCs, graphical user interfaces, the Internet, and Web 2.0 technologies have obviously had major impacts on the IT industry, but according to Microsoft (NSDQ:MSFT) CEO Steve Ballmer, the computing revolution that's about to take place will tie up all the loose ends from previous ones. In...
  • Blog Post: Windows 7 almost five times more secure than XP

    CNET: Windows 7 almost five times more secure than XP Those are the findings of Microsoft's latest Security Intelligence Report, which detailed in depth the state of software vulnerabilities, exploits, security breaches, and malware in 2010. http://news.cnet.com/8301-1009_3-20063220-83.html#ixzz1MXpezMKz...
  • Blog Post: Big trouble with teen hackers

    Teenagers, including children as young as eleven and twelve years old, are increasingly becoming involved in serious cyber-criminal activity that exposes themselves and the users they target to a full range of dangerous repercussions. "Most have absolutely no idea of what getting they're into, they...
  • Blog Post: Are criminal to criminal (C2C) networks making cyber crime too easy?

    With the FBI's announcement of Operation Bot Roast II detailing the arrests of several bot-herders infecting computer systems on an International basis, it's become apparent that a lot of crime is going on with the click of a mouse. One of the more amazing revelations to come forward from Operation Bot...
  • Blog Post: Trojans Dominated Malware Threats in Dec. '08

    Sunbelt Software has released its monthly data dump that charts the most commonly observed malware and spyware threats, and, as has been the case for a good while, trojan attacks continued to lead the way across the Top Ten rankings during Dec. 2008. http://securitywatch.eweek.com/exploits_and_attacks...
  • Blog Post: E-mail typosquatting poses leakage threat

    Companies and political organizations should put more effort into registering mis-typed versions of their primary domain, not only to protect visitors to their Web sites but also to prevent e-mails from accidentally leaking out, a security researcher said on Wednesday. http://www.securityfocus.com...
  • Blog Post: Technology as a Substitute for the IT Security Pro?

    "We are providing a technical solution that will eliminate the need for a lot of cyber professionals because we just don't have enough of them," Zalmai Azmi says. Can technology replace the IT security professional to safeguard government information systems? http://www.govinfosecurity.com/articles...
  • Blog Post: The Biggest Cloud on the Planet is Owned by ... the Crooks!

    Network World: Who's got the biggest cloud in the tech universe? Google? Pretty big, but no. Amazon? Lots and lots of servers, but not even close. Microsoft? They're just getting started. Household names all, but their capacity pales to that of the biggest cloud on the planet, the network of computers...
  • Blog Post: One-fifth of Windows apps go unpatched

    Updates are available, but users haven't installed them, says Secunia. One in five applications installed on Windows PCs are missing security patches, a Copenhagen-based vulnerability tracker has reported. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9054502&source...
  • Blog Post: Hold on to Your Keys!

    There have been a few recent incidents of what we previously thought was extremely rare — malware authors using code signing certificates that were issued to companies with good reputations. The high-profile Stuxnet incident included validly signed malware with misappropriated Authenticode certificates...
  • Blog Post: Newest Security Reports Show Changing Threats

    Scott Hogg, Core Networking and Security: "I find it useful to seek out new perspectives on the ever-changing security realm. By reviewing these [security] reports, we can gain a greater understanding of the emerging Internet threats our organizations are facing." Includes links to various security...
  • Blog Post: Virtualization: What are the security risks?

    Virtualization will become dominant in enterprises, but the security risks are fuzzy at best. Meanwhile, the usual defense–firewalls, security appliances and such aren’t ready for virtualization. http://blogs.zdnet.com/security/?p=821 Urs
  • Blog Post: Enterprise@Risk: 2007 Privacy & Data Protection Survey

    Reportable and multiple privacy breaches rising at alarming rate! Personally identifiable information of customers and employees is being exposed – frequently and repeatedly – potentially putting hundreds of thousands of individuals at risk and exposing organizations to increased liability, according...
  • Blog Post: The Phishing Guide: Understanding and Preventing Phishing Attacks

    This paper [PDF] covers the technologies and security flaws phishers exploit to conduct their attacks, and provides detailed vendor-neutral advice on what organisations can do to prevent future attacks. Security professionals and customers can use this comprehensive analysis to arm themselves against...
  • Blog Post: The Great Debate: Security by Obscurity

    Security by obscurity is, in a nutshell, a violation of Kerckhoffs' Principle, which holds that a system should be secure because of its design, not because the design is unknown to an adversary. The basic premise of Kerckhoffs' Principle is that secrets don't remain secret for very long. Debate by...
  • Blog Post: So Much Data, So Little Encryption

    If you go solely by top-level stats on encryption use, you'll come away feeling pretty secure — 86 percent of the 499 business technology professionals responding to our InformationWeek Analytics State of Encryption Survey employ encryption of some type. But that finding doesn't begin to tell the real...
  • Blog Post: Microcosm of a massive security problem

    Blog Post by Jon Oltsik: A few weeks ago, I gave a presentation to a number of companies about the future of endpoint security. During this presentation, I had the opportunity to ask these folks a number of questions about their IT infrastructure and their plans for it. There were only about 20 organizations...
  • Blog Post: Microsoft Files Patent for HoneyMonkey Exploit Finder

    Microsoft has filed a patent claim for the Strider HoneyMonkey malware/exploit detection system created by our internal research unit. The claim, currently being reviewed at Peer-to-Patent. The HoneyMonkey system, first discussed in August 2005, is best described as an automated Web patrol that uses...
  • Blog Post: Future Phishing

    Forget the Nigerian prince. Phishing scams are moving beyond the misspelled, far-fetched ruses that clog your in-box and beg for your bank codes. In the year to come, security professionals are warning of bank code-stealing exploits that are much slicker and more convincing--hidden in guises as harmless...
  • Blog Post: Malvertising

    Malvertising (malicious advertising) is a reasonably fresh take on an online criminal methodology that appears focused on the installation of unwanted or outright malicious software through the use of internet advertising media networks, exchanges and other user supplied content publishing services common...
  • Blog Post: 3.7 Billion Phishing Emails were sent in the last 12 Months

    [Network World] Cyber criminals sent 3.7 billion phishing emails over the last year, in a bid to steal money from unsuspecting web users, says CPP. Research by the life assistance company revealed that 55 percent of phishing scams are fake bank emails, which try and dupe web users into giving hackers...
  • Blog Post: Phishing, Worms Spike This Year, Say Microsoft and McAfee

    Scammers are targeting social networks with phishing scams and relying more heavily on worms and Trojans to attack computers, according to security trend reports to be released Monday by Microsoft and McAfee. http://news.cnet.com/8301-27080_3-10387768-245.html The Microsoft Security Intelligence...
  • Blog Post: Where in the World do Viruses come from?

    The U.S. continues to dominate as the main source of the world's viruses, producing 15.9 percent of all viruses. It is followed closely by Brazil, which produces 14.5 percent (similar levels to last month's 14.1 percent). You can see more about virus trends from the Microsoft Security Intelligence...