Browse by Tags

Related Posts
  • Blog Post: The Next Leap Forward in Cyber Defense: Taking Action to Help Defeat Adversaries

    It is often said that attackers have an advantage, because the defenders have to protect every part of their systems all the time, while the attacker only has to find one way in. This argument oversimplifies the security landscape and the real strength that defenders can achieve if they work together...
  • Blog Post: Announcing the Enhanced Mitigation Experience Toolkit (EMET) 5.0 Technical Preview

    I’m here at the Moscone Center, San Francisco, California, attending the annual RSA Conference USA 2014 . There’s a great crowd here and many valuable discussions. Our Microsoft Security Response Center (MSRC) engineering teams have been working hard on the next version of EMET, which helps...
  • Blog Post: November 2012 Bulletin Release

    Security Updates Today we released six security bulletins to help protect our customers - four Critical, one Important, and one Moderate – addressing 19 vulnerabilities in Microsoft Windows Shell, Windows Kernel, Internet Explorer, Internet Information Services (IIS), .NET Framework, and Excel...
  • Blog Post: Additional information about Internet Explorer and Security Advisory 2757760

    We will release a Fix it in the next few days to address an issue in Internet Explorer, as outlined in the Security Advisory 2757760 that we released yesterday. While we have only seen a few attempts to exploit the issue, impacting an extremely limited number of people, we are taking this proactive...
  • Blog Post: Announcing the Microsoft Bounty Programs

    Over the years, we've put a lot of work into helping secure the computing ecosystem and limiting the number of issues in our products. The security researcher community is critical to these efforts, as they help us find vulnerabilities in our software that we may have missed. Now we're taking it even...
  • Blog Post: Announcing the BlueHat Prize for Advancement of Exploit Mitigations

    Protecting the general computing ecosystem is a really tough job, and given some of the media headlines, it’s easy to get discouraged and wallow in the problems. It seems like we’re constantly bombarded with statistics measuring the number of bugs, vulnerabilities, or attacks in an attempt...
  • Blog Post: August 2010 Security Bulletin Release

    Hello all. As part of our usual cycle of monthly updates, today Microsoft is releasing 14 security bulletins, addressing 34 vulnerabilities. Eight of those bulletins have a Critical severity rating, and we consider four of those to be high-priority deployments: MS10-052 This bulletin resolves a...
  • Blog Post: Security Advisory 2755801 revised to address Adobe Flash Player issues (Nov. 6, 2012)

    Today, in conjunction with Adobe’s update process, we have revised Security Advisory 2755801 to address issues in Adobe Flash Player in Internet Explorer 10. Customers who have automatic updates enabled will not need to take any action because protections will be downloaded and installed automatically...
  • Blog Post: Verifying update hashes

    Some of you may have noticed us improving our defense-in-depth practices for bulletins by supplying sha1 and sha2 hashes in the Knowledge Base (KB) articles . This has been most visible in the KB with the addition of the “File hash information” section, but it is also noted in the Frequently...
  • Blog Post: Windows Store App Security Updates

    We are committed to adapting our policies as the world evolves and with the new Windows Store, we evaluated how to best release security updates for Windows Store apps. Our goal is to have a quick, transparent and painless security update process. With this in mind, we will deliver high quality security...
  • Blog Post: Are you prepared for the BlueHat Challenge?

    Today we are kicking off a new challenge so you can showcase your security prowess and, if we can, help you build some more. Our BlueHat Challenge is a series of computer security questions, which increase in difficulty as you progress. Only the rare and talented engineer will be able to finish the Challenge...
  • Blog Post: Announcing the 2013 MSRC Progress Report featuring MAPP expansions

    Over the years, our customers have come to expect a certain regularity and transparency in both our security updates and the guidance that goes with them. One regular piece of communication about our work is a yearly progress report, which provides a look into the program updates and bulletin statistics...
  • Blog Post: Exploitability Index Improvements & Advance Notification Service for May 2011 Bulletin Release

    Hello everyone, Today we are announcing changes to Microsoft’s Exploitability Index. Since October 2008, we have used the Exploitability Index to provide customers with valuable exploitability analysis for our security bulletins, and starting Tuesday this information will become even more...