Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

Browse by Tags

Related Posts
  • Blog Post: Microsoft Malware Removal Starter Kit (2008-06)

    Many small- and medium-sized organizations use antivirus software, and yet new viruses, worms, and other forms of malicious software (malware) continue to infect large numbers of computers in these Organizations. Malware proliferates at alarming speed and in many different ways, which makes it Particularly...
  • Blog Post: Trojans Dominated Malware Threats in Dec. '08

    Sunbelt Software has released its monthly data dump that charts the most commonly observed malware and spyware threats, and, as has been the case for a good while, trojan attacks continued to lead the way across the Top Ten rankings during Dec. 2008. http://securitywatch.eweek.com/exploits_and_attacks...
  • Blog Post: The Microsoft Security Update Guide

    This guide was designed to help IT professionals better understand and use Microsoft security release information, processes, communications, and tools. Our goal is to help IT professionals manage organizational risk and develop a repeatable, effective deployment mechanism for security updates. http...
  • Blog Post: VBootkit vs. Bitlocker in TPM mode

    "So at HITB in Dubai this week - some researchers announced a proof of concept 'bootkit' for Vista. A bootkit is a rootkit that is able to load from a master boot record and persist in memory all the way through the transition to protected mode and the startup of the OS. It's a very interesting type...
  • Blog Post: Microsoft Security Compliance Manager released

    The Security Compliance Manager will help you accelerate knowledge to merge best practices, customize once to centralize decision making, and export to multiple formats to enable monitoring, verification, and compliance. The tool is designed to help accelerate your organization’s ability to efficiently...
  • Blog Post: 9 Ways to Increase the Security of Your Laptop While on the Road

    Using your laptop to get work done away from your office or on the road is becoming widely accepted. But this rapid growth in laptop computing has made portable systems the target for theft around the world. If your laptop computer is stolen, company information can be exposed, as well as your personal...
  • Blog Post: Windows Server 2008 Administrative Delegation Techniques

    Ever since Microsoft released Windows 2000 way back when, the options for delegating certain tasks have been available. The concepts of delegation can be a bit confusing, but in the core of what the delegation provides is essential to an efficient network. Without the use of delegations, you are stuck...
  • Blog Post: Using Autoplay on Vista To Stop Attacks (Islandhoping)

    The technique of island hopping—penetrating a network through a weak link and then hopping around systems within that network—has been around for years. But it continues to take on new dimensions. In today's security-conscious IT environments, people are often the weakest link, and malicious users are...
  • Blog Post: Anatomy of a SQL Injection Incident

    Blog Posting from Neil Carpenter: "A number of people are reporting that 10K+ Web sites have been hacked via a SQL injection attack that injected a link to a malicious .js file into text fields in their database. Since the CSS Security team here at Microsoft worked with several of these incidents...
  • Blog Post: THE CABLE GUY: Network Policy Server

    Nothing’s more critical to the health of your enterprise than a secure network, and Network Policy Server (NPS), new in Windows Server 2008, is an important tool for managing access. It lets you implement organization-wide policies, providing centralized authentication, authorization, and accounting...
  • Blog Post: One-fifth of Windows apps go unpatched

    Updates are available, but users haven't installed them, says Secunia. One in five applications installed on Windows PCs are missing security patches, a Copenhagen-based vulnerability tracker has reported. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9054502&source...
  • Blog Post: New Microsoft Security Vulnerability Research and Defense blog

    The Security Vulnerability Research & Defense blog’s intent is to provide more information about Microsoft vulnerabilities, mitigations and workarounds, and active attacks. http://blogs.technet.com/swi/ Urs
  • Blog Post: So Much Data, So Little Encryption

    If you go solely by top-level stats on encryption use, you'll come away feeling pretty secure — 86 percent of the 499 business technology professionals responding to our InformationWeek Analytics State of Encryption Survey employ encryption of some type. But that finding doesn't begin to tell the real...
  • Blog Post: Microsoft SDL team releases new security tools

    The Security Development Lifecycle (SDL) team at Microsoft released two security testing tools. BinScope Binary Analyzer BinScope is a Microsoft verification tool that analyzes binaries on a project-wide level to ensure that they have been built in compliance with Microsoft’s Security Development...
  • Blog Post: Microsoft Files Patent for HoneyMonkey Exploit Finder

    Microsoft has filed a patent claim for the Strider HoneyMonkey malware/exploit detection system created by our internal research unit. The claim, currently being reviewed at Peer-to-Patent. The HoneyMonkey system, first discussed in August 2005, is best described as an automated Web patrol that uses...
  • Blog Post: Microsoft buys U-Prove technology

    Microsoft Corp. hopes to beef up online privacy with the acquisition of the U-Prove technology, the company announced on Thursday. U-Prove was developed by Stefan Brands at Credentica Inc. to allow Internet users to disclose only the minimum amount of personal information when conducting electronic...
  • Blog Post: Phishing, Worms Spike This Year, Say Microsoft and McAfee

    Scammers are targeting social networks with phishing scams and relying more heavily on worms and Trojans to attack computers, according to security trend reports to be released Monday by Microsoft and McAfee. http://news.cnet.com/8301-27080_3-10387768-245.html The Microsoft Security Intelligence...
  • Blog Post: Where in the World do Viruses come from?

    The U.S. continues to dominate as the main source of the world's viruses, producing 15.9 percent of all viruses. It is followed closely by Brazil, which produces 14.5 percent (similar levels to last month's 14.1 percent). You can see more about virus trends from the Microsoft Security Intelligence...
  • Blog Post: Conficker Advisories

    Microsoft Conficker guidance page for IT Professionals and those focused on security in the enterprise: http://technet.microsoft.com/en-us/security/dd452420.aspx Microsoft Conficker guidance page for consumers and home users: http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx ...
  • Blog Post: Reminder: Support for Windows XP SP2 and Windows 2000 ended July 13, 2010

    As Microsoft announced in 2008, support for Windows XP Service Pack 2 (SP2) will end on July 13, 2010. Support for Windows 2000 will end on the same date. Customers running an unsupported version of Windows or Windows service pack will not be eligible for any Microsoft support options. Updates, including...
  • Blog Post: Black Hat: new operating systems security metric

    At the Black Hat Security Conference currently taking place in Amsterdam, researchers from the Zurich ETH (Swiss Federal Institute of Technology) have reported a new model for determining the security of operating systems. They don't just count the number of holes and how critical they are, but also...
  • Blog Post: Windows 7 Security Primer

    Good series of articles about Windows 7 security: http://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part1.html http://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part2.html http://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part3.html These articles cover...
  • Blog Post: Microsoft support lifecycle for service Packs

    Perhaps a good idea to do some end-of-year cleanup! You can find what product services packs are supported here: http://support.microsoft.com/gp/lifesupsps Urs
  • Blog Post: Security Advisory 961051 - More information

    Microsoft revised the Workarounds section of Security Advisory 961051. The Security Vulnerability Research & Defense team wanted to share more detail about the vulnerability and explains the additional workarounds here to help you protect your computers: http://blogs.technet.com/swi/archive/2008...
  • Blog Post: Microsoft adds new Anti-Exploit APIs into Windows

    Microsoft has announced plans to add new anti-exploitation APIs into Windows Vista SP1, Windows XP SP3 and Windows Server 2008 as part of a larger plan to secure the Windows ecosystem. According to Michael Howard, a senior program manager in Microsoft's security unit, the delivery of the new APIs...