Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Browse by Tags

Related Posts
  • Blog Post: Apple Recommends Running Multiple AV Engines

    This is an interesting thing: I just read this post on ZDNet . The blamed us for being the key target for viruses and they always told me that they do not have a security problem. I am convinced that there is no software product having no security vulnerabilities and Apple proved over time that they...
  • Blog Post: Google Chrome and Silent Patching

    This morning I opened one of the Swiss Sunday newspapers and Google Chrome made it to the front-page with a “best practice approach” for deploying security updates. In the article itself it was claimed that Chrome is one of the best browsers with regards to security as the deploy patches silently, without...
  • Blog Post: Lies, Damned Lies and the “Gone Google” Calculator

    An interesting post (by a Microsoft employee) on the Google cost calculator. An interesting read on the way they compete…. Lies, Damned Lies and the “Gone Google” Calculator Roger
  • Blog Post: This is about processes: Google Chrome Vulnerable to Carpet Bombing

    This is the kind of stuff I hate to see – definitely within Microsoft but to a similar extent within competitors. I think we have a joint mission: Make the Internet a safer (and more trustworthy) place. There was quite some noise yesterday around Google Chrome. And a lot of noise about "safer browsing...
  • Blog Post: Google accuses Microsoft to be unfair–Outch (or just stupid?)

    An interesting one: Google Threw A Punch, Microsoft Fires Back With A Missile Roger
  • Blog Post: Apple releases Keyboardless Laptop

    Wow, there are news, which we cannot cope with. Apple just announced the first laptop without keyboard : Apple Introduces Revolutionary New Laptop With No Keyboard and additionally the new Mac Tiny : They even talk about the Mac Nano in this video Enjoy Roger
  • Blog Post: Article was Bogus: Do Mac Users not need Anti-Virus Protection?

    Today I was having a discussion with a religious Mac fan claiming that the only problem with security on the Internet is Windows and then I read this article on ZDNet: Despite what blogs (and Apple) say, Macs will eventually have malware In there it is referenced that the article I was quoting yesterday...
  • Blog Post: Do We Really Want Privacy?

    I really love reading Kim Cameron’s Identity Weblog . Fairly often it is thought provoking… He recently wrote about his experience with the new iPhone privacy policy: Apple giving out your iPhone fingerprints and location . He was one (probably of the very few) reading the privacy policy and found the...
  • Blog Post: Moving from Linux to Windows

    I know, that’s the second time now I am doing this comparison thingy and I promise that I will stop again and deliver you a cool tool as the next post but I read this article: Why I’ve finally had it with my Linux server and I’m moving back to Windows – be sure that you read the comments. To me they...
  • Blog Post: Servers still not patched

    I just read an article this morning on Linux servers under the Phalanx gun: A problem with people, not code . There were quite some things which made me think when I read it: There was a statement in there, which I – obviously – did not like at all: Linux may be inherently more secure as a system...
  • Blog Post: Why Google Won’t Beat Microsoft on Cloud Collaboration

    Well, it is not me saying that, it is actually Clint Boulton , eWeek. He published an article on 10 Reasons Why Google Won't Beat Microsoft in Cloud Collaboration and they are: Microsoft Is Big, Getting Bigger Local Still Preferable? Microsoft Now Lives in the Cloud Bang for the Buck Lies with Microsoft...
  • Blog Post: Security – A Feature Discussion? Some Thoughts on Google’s Chrome OS

    To be clear upfront: This is not a “Microsoft versus Google” post. I cannot even judge how far Google pushed security with the Chrome OS. But the following article raised quite some questions how we look at security: Inside the Google Chrome OS security model . This article, like so many when security...
  • Blog Post: When it comes to security, who do you trust more - Microsoft or Google?

    I started to read the article and actually just wanted to Tweet about it but then I voted and had to publish at least the current state: When it comes to security, who do you trust more? Microsoft (44%) Google (32%) Neither (22%) Both (3%) Total Votes: 716 This is just now – might...
  • Blog Post: Vulnerability Disclosure to Compete?

    As you know (I stress that fairly often ), I am Swiss. The reason why I am stressing this today is that I want to give you an example on security from the Swiss market: The banks here on place compete with each other – obviously. However, I have never seen the banks competing on security. They...
  • Blog Post: News from the Interop front

    Not directly security related: I am often asked about the interoperability between our products and third-party products. Additionally people claim that we do not allow others to use our technology – that we lock you in. Just now I read the following news: Google just announced Google Sync , which licenses...
  • Blog Post: Internet Explorer 8 best to protect customer

    NSSLabs just recently published a study on browser security with regards to Phising and Malware protection, which we comissioned. To take it upfront: The whole methodology is transperent and therefore rather than challenging the results, let’s learn from them how we can improve. As I do not want to take...
  • Blog Post: Council of Europe Octopus Conference- Some Thoughts

    l am still sitting in the parliament room of the Council of Europe at the celebration event for the Budapest Convention. It was another very good event advancing the challenges fighting Cybercrime. Let me try to summarize a few thoughts: The Budapest Convention is probably the best convention out there...
  • Blog Post: Open Source and Hackers

    The debate is probably as old as the Open Source software development model: Which one is more secure: Open Source or shared source as we at Microsoft run it? I know that we could now enter a religious debate about that, which I do not want to as I do not really believe in the value of such debate. ...
  • Blog Post: Microsoft By Numbers

    If you have not seen these numbers, they are very impressive: Microsoft by the numbers . One of the most impressive figure in there is that we sold 150,000,000 Windows 7 licenses since the launch. Well, this figure by itself does not really impress you, no? It is just big I guess. Well there is another...
  • Blog Post: Is Mozilla really the most secure Web Browser?

    On http://en-us.www.mozilla.com/en-US/firefox/security/ Mozilla claims that Firefox is “The Safest Web Browser”. Unfortunately they leave a lot of their claims unsupported. This is something our Jeff Jones looks into. Since a lot of years Jeff looks into figures and metrics around security and is very...
  • Blog Post: Welcome to reality: Apple Acknowledges OS X Malware

    A few years ago, we ran a huge event in Switzerland: We offered people in Switzerland to come to us (we were for a whole week at the airport in Zurich) with their PC and we check it for malware, patch it etc. We did this with a lot of partners and had live TV coverage at primetime in Swiss TV. A huge...