TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Compatability & Converters
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support by product
Exchange Server
Forefront Server
Forefront Edge Security
Forefront Server Security
Internet Explorer
Office
SharePoint
SQL Server
System Center
Windows Server
Windows XP
Windows Vista
Windows 7
Windows 8
Other support links
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Look up event IDs and error codes
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Options
About
Email Blog Author
RSS for posts
Atom
RSS for comments
OK
Search Blogs
Tags
Cloud
Cloud Computing
Competition
Consumer
Crime
Critical Infrastructure Protection
cybercrime
Events/Training
Fun
Incident Response
Incidents
Industry Associations
Law Enforcement
Microsoft
Microsoft products
patch management
Policies
Policy
politics
Privacy
Processes
Security
Technology
Terrorism
trends
Archive
Archives
August 2013
(3)
June 2013
(4)
May 2013
(3)
April 2013
(2)
March 2013
(1)
February 2013
(2)
January 2013
(5)
December 2012
(1)
November 2012
(1)
October 2012
(4)
September 2012
(4)
August 2012
(4)
July 2012
(1)
June 2012
(3)
May 2012
(2)
April 2012
(9)
March 2012
(2)
February 2012
(2)
January 2012
(1)
December 2011
(3)
November 2011
(6)
October 2011
(11)
September 2011
(8)
August 2011
(3)
July 2011
(4)
June 2011
(8)
May 2011
(7)
April 2011
(7)
March 2011
(13)
February 2011
(18)
January 2011
(15)
December 2010
(6)
November 2010
(15)
October 2010
(15)
September 2010
(32)
August 2010
(10)
July 2010
(14)
June 2010
(18)
May 2010
(8)
April 2010
(6)
March 2010
(22)
February 2010
(5)
January 2010
(12)
December 2009
(8)
November 2009
(7)
October 2009
(11)
September 2009
(17)
August 2009
(12)
July 2009
(12)
June 2009
(13)
May 2009
(14)
April 2009
(16)
March 2009
(11)
February 2009
(12)
January 2009
(14)
December 2008
(22)
November 2008
(13)
October 2008
(22)
September 2008
(8)
August 2008
(14)
July 2008
(4)
June 2008
(16)
May 2008
(30)
April 2008
(29)
March 2008
(19)
February 2008
(16)
January 2008
(26)
December 2007
(18)
November 2007
(23)
October 2007
(11)
September 2007
(10)
August 2007
(7)
July 2007
(11)
June 2007
(11)
May 2007
(4)
April 2007
(9)
March 2007
(8)
February 2007
(8)
January 2007
(6)
October, 2008
TechNet Blogs
»
Roger's Security Blog
»
October, 2008
Sort by:
Most Recent
|
Most Views
|
Most Comments
Excerpt View
|
Full Post View
Hacker arrested for Video Giving Tips for ATM Skimmers
Posted
over 5 years ago
by
rhalbheer
2
Comments
It will be interesting how you see it. When I blogged on Suspended Jail for Hacking Tutorial in France , I got quite some negative feedback like “do you have nothing better to do than to go after these guys”, “why should it be illegal to publish such...
Risk of Outsourcing (and Security Outsourcing)
Posted
over 5 years ago
by
rhalbheer
2
Comments
I am often asked about the risks of outsourcing (we often talk about processes, legal risks (e.g. Data Protection), etc.) – the list is very long. Today I read an article which touches a completely different issue: It is all about the security processes...
Getting Ready for TechED EMEA
Posted
over 5 years ago
by
rhalbheer
2
Comments
It is as so often, autumn is the time when all the big events are happening in EMEA. This week was RSA Europe (or I think still is) and next week I am looking forward to TechEd EMEA in Barcelona. So, I worked at RSA Europe on Monday and Tuesday on the...
H1 OS Desktop Vulnerability Report – Get It Now
Posted
over 5 years ago
by
rhalbheer
3
Comments
You might know Jeff Jones' work on the different vulnerability reports comparing different products and vendors. Our goal is to understand and measure our progress and see where we stand with regards to the industry. Today, Jeff release his OS Desktop...
More Details on the MS08-067 Vulnerability
Posted
over 5 years ago
by
rhalbheer
1
Comment
Our security team just published an excellent post with a lot more details on the vulnerability we patched. You should definitely read it: http://blogs.technet.com/swi/archive/2008/10/23/More-detail-about-MS08-067.aspx Roger
MS08-067 Out of Band Released
Posted
over 5 years ago
by
rhalbheer
1
Comment
This is just to inform you that we just released the announced out of band security update MS08-067 . Please read the bulletin carefully and then apply the update as soon as possible Roger
Out of Band Security Update to be Released
Posted
over 5 years ago
by
rhalbheer
I guess you have seen this already but wanted to make sure that we are reaching you: We are planning to release an Out of Band Security Update today 10am Pacific Time (which is 18pm GMT). This update will affect all currently supported versions of Windows...
“Stacked against hacks” in World Finance
Posted
over 5 years ago
by
rhalbheer
2
Comments
I recently had the pleasure to be part of an article in World Finance called Stacked against hacks Visit the virtual version here and go to page 60 and 61 Roger
Microsoft Security Assessment Tool v4.0 available
Posted
over 5 years ago
by
rhalbheer
1
Comment
I already blogged a few times on MSAT (the Microsoft Security Assessment Tool). We just released a new version for it, version 4. For those of you who do not know MSAT: MSAT is a free (stress: free) Risk Assessment Tool mainly targeted a Small and...
Two Important Changes Today to Our Bulletin Process
Posted
over 5 years ago
by
rhalbheer
Today is the day! At Blackhat in August we announced two significant changes to our bulletin release process and today it is the first time this actually kicks in. Just to recapitulate: What did we change? We introduced the Microsoft Active Protections...
Windows 7 is called Windows 7
Posted
over 5 years ago
by
rhalbheer
Cool title, isn't it? And you really read this post? Well then: We announced yesterday at PDC that we now will name the next version of Windows as we code named it: Windows 7! So, you can read Mike Nash's blog post about that: http://windowsvistablog...
Deploying IPsec Server and Domain Isolation using Windows Server 2008 Group Policy
Posted
over 5 years ago
by
rhalbheer
1
Comment
As you know (at least I hope that you do) we introduced Network Access Protection with Windows Server 2008. Thomas Shinder now published an article on WindowsSecurity.com about how to implement NAP and IPSec and Domain Isolation via Group Policies. It...
User Account Control and What We Learned
Posted
over 5 years ago
by
rhalbheer
It is still something, people love to blog about: User Account Control. It is one of the most discussed features in Windows Vista. Now, our engineering team published a blog about the learnings and a few things about what we are going to do in Windows...
Network Access Protection Design Guide
Posted
over 5 years ago
by
rhalbheer
If you are looking into deploying Network Access Protection, have a look at the recently published Network Access Protection Design Guide Roger
Challenging the 10 Immutable Laws of Security
Posted
over 5 years ago
by
rhalbheer
You probably know them: The 10 Immutable Laws of Security , we published I think around 2000 and they were often cited. They are: Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore Law #2...
Once Again: A Scam using Microsoft’s Name to Install Malware
Posted
over 5 years ago
by
rhalbheer
It happens pretty often but this time it seems to be wider spread then normal as our traffic with regards to this issue is higher than usual: There is a mail circulating pretending that it is coming from Steve Lipner here at Microsoft telling you to install...
Estonia’s Cyber Security Strategy
Posted
over 5 years ago
by
rhalbheer
1
Comment
Following the attacks on Estonia, they published a pretty interesting paper called Cyber Security Strategy by the Ministry of Defense in Estonia. One thing which I see again and again is that most of the people looking into such strategies conclude that...
SAFECode released „Fundamental Practices for Secure Software Development”
Posted
over 5 years ago
by
rhalbheer
SAFECode just released a new paper called Fundamental Practices for Secure Software Development . This is a collaboration of different people from different companies (SAP, EMC, Symantec, Juniper, Nokia and Microsoft). As you probably know, SAFECode...
Version 3 of Windows Common Criteria Documentation Available
Posted
over 5 years ago
by
rhalbheer
This is completely new but end of September we published the version 3 of the documentation on the Common Criteria certification for Windows XP SP2 and Windows Server 2003 R2 SP2. Read this in Tim Myer's Blog: Version 3.0 of Windows XP and Windows Server...
Some Thoughts on UAC
Posted
over 5 years ago
by
rhalbheer
I blogged several times already on UAC as this has been (and partly still is) a very disputed security feature in Windows Vista (which I still support!). I just found today a not really new blog post on UAC, which I think is worth reading. It is from...
Why I do not like e-voting (part 3)
Posted
over 5 years ago
by
rhalbheer
It goes on and on and on: Read this one Judge Suppresses Report on Voting Machine Security Roger
Armored truck robber uses Craigslist to make getaway
Posted
over 5 years ago
by
rhalbheer
This is really clever (sounds like Hollywood but it seems to be real): In a move that could be right out of a Hollywood movie, a brazen crook apparently used a Craigslist ad to hire a dozen unsuspecting decoys to help him make his getaway following...