TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Compatability & Converters
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support by product
Exchange Server
Forefront Server
Forefront Edge Security
Forefront Server Security
Internet Explorer
Office
SharePoint
SQL Server
System Center
Windows Server
Windows XP
Windows Vista
Windows 7
Windows 8
Other support links
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Look up event IDs and error codes
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Options
About
Email Blog Author
RSS for posts
Atom
RSS for comments
OK
Search Blogs
Tags
Cloud
Cloud Computing
Competition
Consumer
Crime
Critical Infrastructure Protection
cybercrime
Events/Training
Fun
Incident Response
Incidents
Industry Associations
Law Enforcement
Microsoft
Microsoft products
patch management
Policies
Policy
politics
Privacy
Processes
Security
Technology
Terrorism
trends
Archive
Archives
August 2013
(3)
June 2013
(4)
May 2013
(3)
April 2013
(2)
March 2013
(1)
February 2013
(2)
January 2013
(5)
December 2012
(1)
November 2012
(1)
October 2012
(4)
September 2012
(4)
August 2012
(4)
July 2012
(1)
June 2012
(3)
May 2012
(2)
April 2012
(9)
March 2012
(2)
February 2012
(2)
January 2012
(1)
December 2011
(3)
November 2011
(6)
October 2011
(11)
September 2011
(8)
August 2011
(3)
July 2011
(4)
June 2011
(8)
May 2011
(7)
April 2011
(7)
March 2011
(13)
February 2011
(18)
January 2011
(15)
December 2010
(6)
November 2010
(15)
October 2010
(15)
September 2010
(32)
August 2010
(10)
July 2010
(14)
June 2010
(18)
May 2010
(8)
April 2010
(6)
March 2010
(22)
February 2010
(5)
January 2010
(12)
December 2009
(8)
November 2009
(7)
October 2009
(11)
September 2009
(17)
August 2009
(12)
July 2009
(12)
June 2009
(13)
May 2009
(14)
April 2009
(16)
March 2009
(11)
February 2009
(12)
January 2009
(14)
December 2008
(22)
November 2008
(13)
October 2008
(22)
September 2008
(8)
August 2008
(14)
July 2008
(4)
June 2008
(16)
May 2008
(30)
April 2008
(29)
March 2008
(19)
February 2008
(16)
January 2008
(26)
December 2007
(18)
November 2007
(23)
October 2007
(11)
September 2007
(10)
August 2007
(7)
July 2007
(11)
June 2007
(11)
May 2007
(4)
April 2007
(9)
March 2007
(8)
February 2007
(8)
January 2007
(6)
February, 2011
TechNet Blogs
»
Roger's Security Blog
»
February, 2011
Sort by:
Most Recent
|
Most Views
|
Most Comments
Excerpt View
|
Full Post View
Libya Violence Exploited by Scammers
Posted
over 2 years ago
by
rhalbheer
1
Comment
It is a repeating pattern but not the less disgusting. Whenever bad things happens on the globe, the criminals are not far. This happened during hurricane Katrina, the tsunami in Indonesia, the earthquake in Haiti and now, not surprisingly in Libya as...
A European Dinner :-)
Posted
over 2 years ago
by
rhalbheer
I just got this from a friend of mine: European heaven : You are invited to an official dinner. The English welcomes you, the French is cooking, the Italian is making the show and the event is organized by the German. European hell: You are invited to...
Windows Phone 7 Updates
Posted
over 2 years ago
by
rhalbheer
You might have heard that we will ship an update for Windows Phone 7 soon. Yes, with some new functionality, I am waiting for as well. In the next few days we update the update mechanism to make the delivery for the next version smoother. The interesting...
WHY ARE YOU STILL READING THIS?
Posted
over 2 years ago
by
rhalbheer
1
Comment
Just a reminder: I am slowly consolidating my blog to http://www.halbheer.info/security . So, if you still read this, I would appreciate you moving over as I do not want to lose you as a reader Thank you Roger
Infrastructure Planning and Design Guide for Malware Response
Posted
over 2 years ago
by
rhalbheer
A new version of this guide went live – I think something, you should look at. There is a methodology and a process in detail: So, if you want to learn more: http://technet.microsoft.com/en-us/library/cc162838.aspx Roger
Six “New” Attack Vectors
Posted
over 2 years ago
by
rhalbheer
Reading this article Six New Hacks That Will Make Your CSO Cringe made me think as it has a few fairly interesting approaches: Fake Phone Networks : I am wondering how much work it takes to do it. If the effort is not too high, I am not (yet) too worried...
Fighting a Botnet
Posted
over 2 years ago
by
rhalbheer
Microsoft Malware Protection Center published a document on Battling the Zbot Threat , a special edition of the Security Intelligence Report . It is a very good document, worth looking at. This is the intro (to make you curious for more): This document...
Privacy à la Dilbert
Posted
over 2 years ago
by
rhalbheer
It kind of reminds me of someone – but whom? Roger source: Dilbert website
How to Do an Online Background Check for Free
Posted
over 2 years ago
by
rhalbheer
Well, basically this title attracted my attention: How to Do an Online Background Check for Free . I had to try it with myself. So I started, following the sites and suggestions in the article: I clicked on the first link and landed on 9 Sites That Find...
Scott Charney at RSA this year
Posted
over 2 years ago
by
rhalbheer
It is kind of a tradition that Scott Charney, our Corporate Vice President for Trustworthy Computing, is speaking at RSA . If you look back, he always showed the evolution of Trustworthy Computing and spoke about e.g. End to End Trust and other concepts...
Phone Security: Lose your Passwords on iPhone in a few minutes
Posted
over 2 years ago
by
rhalbheer
Jailbreaking is probably one of the biggest problems on phones – mainly because it allows easy access to your secrets. Fraunhofer Institute in Germany showed just that: Therefore, do not think that your iPhone is secure. Make sure you at least remote...
Security Impact of the Nokia/Microsoft Announcement
Posted
over 2 years ago
by
rhalbheer
I am definitely looking forward to the collaboration Nokia/Microsoft and it seems to have gotten quite some chatter on the web. Interestingly, F-Secure looked into it as well: They looked at the app-model and the sandboxing technology in Windows Phone...
Internet Explorer 9, Release Candidate available
Posted
over 2 years ago
by
rhalbheer
You might have seen it: IE9 RC is now ready for download. I am using IE9 since quite a while and it really, really rocks. Install it from here . Roger
The Wild West on the Internet… A Crime Story
Posted
over 2 years ago
by
rhalbheer
1
Comment
A fairly interesting thriller on the Internet. It just shows that we need better ways to collaborate between private and public sector and to hunt criminals: How one man tracked down Anonymous—and paid a heavy price Scary… Roger
Cybercrime: A Recession-Proof Growth Industry
Posted
over 2 years ago
by
rhalbheer
1
Comment
That’s obvious as people probably tend to want to trust more, the worse their situation is. Nevertheless it is even more disgusting going after the desperate! Cybercrime: A Recession-Proof Growth Industry Roger
How much it takes to get on the No-Fly List
Posted
over 2 years ago
by
rhalbheer
1
Comment
I questioned the value of No-Fly lists since quite a while as I read all these story about how people get on the list but this is kind of the strangest story I ever heard. A UK Immigration officer put his own wife on the No-Fly list as he wanted her to...
Quit Worrying About Cloud Security?
Posted
over 2 years ago
by
rhalbheer
1
Comment
Well, it is not THAT easy but at least there are people starting to claim that it is not as hard as it seems to be sometimes. I stumbled across the following article: Why you can quit worrying about cloud security (thank you Jim), which makes a lot of...
Fighting Crime and Protecting Privacy–a Contradiction?
Posted
over 2 years ago
by
rhalbheer
I was reading an article today called Does Your ISP Care About Protecting Your Privacy? . An interesting question. The ISPs in the article are even thinking of VPNing all the traffic to avoid the necessity for keeping the logs (or probably better, NATing...