Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

February, 2011

  • Libya Violence Exploited by Scammers

    It is a repeating pattern but not the less disgusting. Whenever bad things happens on the globe, the criminals are not far. This happened during hurricane Katrina, the tsunami in Indonesia, the earthquake in Haiti and now, not surprisingly in Libya as...
  • A European Dinner :-)

    I just got this from a friend of mine: European heaven : You are invited to an official dinner. The English welcomes you, the French is cooking, the Italian is making the show and the event is organized by the German. European hell: You are invited to...
  • Windows Phone 7 Updates

    You might have heard that we will ship an update for Windows Phone 7 soon. Yes, with some new functionality, I am waiting for as well. In the next few days we update the update mechanism to make the delivery for the next version smoother. The interesting...
  • WHY ARE YOU STILL READING THIS?

    Just a reminder: I am slowly consolidating my blog to http://www.halbheer.info/security . So, if you still read this, I would appreciate you moving over as I do not want to lose you as a reader Thank you Roger
  • Infrastructure Planning and Design Guide for Malware Response

    A new version of this guide went live – I think something, you should look at. There is a methodology and a process in detail: So, if you want to learn more: http://technet.microsoft.com/en-us/library/cc162838.aspx Roger
  • Six “New” Attack Vectors

    Reading this article Six New Hacks That Will Make Your CSO Cringe made me think as it has a few fairly interesting approaches: Fake Phone Networks : I am wondering how much work it takes to do it. If the effort is not too high, I am not (yet) too worried...
  • Fighting a Botnet

    Microsoft Malware Protection Center published a document on Battling the Zbot Threat , a special edition of the Security Intelligence Report . It is a very good document, worth looking at. This is the intro (to make you curious for more): This document...
  • Privacy à la Dilbert

    It kind of reminds me of someone – but whom? Roger source: Dilbert website
  • How to Do an Online Background Check for Free

    Well, basically this title attracted my attention: How to Do an Online Background Check for Free . I had to try it with myself. So I started, following the sites and suggestions in the article: I clicked on the first link and landed on 9 Sites That Find...
  • Scott Charney at RSA this year

    It is kind of a tradition that Scott Charney, our Corporate Vice President for Trustworthy Computing, is speaking at RSA . If you look back, he always showed the evolution of Trustworthy Computing and spoke about e.g. End to End Trust and other concepts...
  • Phone Security: Lose your Passwords on iPhone in a few minutes

    Jailbreaking is probably one of the biggest problems on phones – mainly because it allows easy access to your secrets. Fraunhofer Institute in Germany showed just that: Therefore, do not think that your iPhone is secure. Make sure you at least remote...
  • Security Impact of the Nokia/Microsoft Announcement

    I am definitely looking forward to the collaboration Nokia/Microsoft and it seems to have gotten quite some chatter on the web. Interestingly, F-Secure looked into it as well: They looked at the app-model and the sandboxing technology in Windows Phone...
  • Internet Explorer 9, Release Candidate available

    You might have seen it: IE9 RC is now ready for download. I am using IE9 since quite a while and it really, really rocks. Install it from here . Roger
  • The Wild West on the Internet… A Crime Story

    A fairly interesting thriller on the Internet. It just shows that we need better ways to collaborate between private and public sector and to hunt criminals: How one man tracked down Anonymous—and paid a heavy price Scary… Roger
  • Cybercrime: A Recession-Proof Growth Industry

    That’s obvious as people probably tend to want to trust more, the worse their situation is. Nevertheless it is even more disgusting going after the desperate! Cybercrime: A Recession-Proof Growth Industry Roger
  • How much it takes to get on the No-Fly List

    I questioned the value of No-Fly lists since quite a while as I read all these story about how people get on the list but this is kind of the strangest story I ever heard. A UK Immigration officer put his own wife on the No-Fly list as he wanted her to...
  • Quit Worrying About Cloud Security?

    Well, it is not THAT easy but at least there are people starting to claim that it is not as hard as it seems to be sometimes. I stumbled across the following article: Why you can quit worrying about cloud security (thank you Jim), which makes a lot of...
  • Fighting Crime and Protecting Privacy–a Contradiction?

    I was reading an article today called Does Your ISP Care About Protecting Your Privacy? . An interesting question. The ISPs in the article are even thinking of VPNing all the traffic to avoid the necessity for keeping the logs (or probably better, NATing...