Microsoft Security Blog

The official Microsoft blog for discussing industry and Microsoft security topics.

April, 2012

  • Hundreds of Pages of New Security Intelligence Now Available: Microsoft Security Intelligence Report Volume 12 Released

    Today we released the latest volume of the Microsoft Security Intelligence Report (SIR) containing a large body of new data and analysis on the threat landscape.  This volume of the SIR includes:

    • Latest industry vulnerability disclosure trends and analysis
    • Latest data and analysis of global vulnerability exploit activity
    • Latest trends and analysis on global malware and potentially unwanted software
    • Latest analysis of threat trends in more than 100 countries/regions around the world
    • Latest data and insights on how attackers are using spam and other email threats
    • Latest global and regional data on malicious websites including phishing sites, malware hosting sites and drive-by download sites

    In addition, we have included a section in the report focused on how the threat called Conficker continues to propagate.  Conficker has been one of the top threats in the enterprise for the past two and a half years, and many of the customers I talk to have been struggling to eradicate it from their environments.

  • Trust in Computing Research : 3 : Computing and the Internet (Geographic breakdown)

    In the first part of the series , we looked specifically at the general use of Computing and the Internet, with the second part focusing on the audience breakdown for these questions. While some of the findings are as we had anticipated, we found several interesting results: Over 95 percent of respondents worldwide are frequent Internet users. Personal Computers are still the most widely used devices, with Smartphone use second. Nearly 93 percent of respondents use the Internet frequently...
  • Trust in Computing Research: 2 : Computing and the Internet (Audience breakdown)

    In the first part of the series , we looked specifically at the general use of computing and the Internet. While some of the findings are as we had anticipated, we found several interesting results: More than 95 percent of respondents worldwide are frequent Internet users. Personal computers are still the most widely used devices, with smartphone use following. The first part of the series highlighted that 95 percent of people use the Internet frequently. We wanted to then look at the breakdown Internet...
  • Weekly Roundup: April 20, 2012 – Cybersecurity R&D Trends

    Security News Security news stories this week covered CISPA, a cybersecurity bill that continues to draw fire from privacy groups: some experts weigh the pros while others say the bill is too vague as written and predict it will be tabled. Also in the news Anonymous claims Pastebin censorship and creates an alternative site where hacktivists can dump stolen data. The New York Times reports on a young man who developed secure chats and Forbes reports on software-controlled medical devices vulnerable...
  • Online Safety: “Protect Your PC” and Stop. Think. Connect. – TwC Interactive Timeline Part 6

    Continuing the Interactive Timeline series outlining some of the seminal events that have occurred over the last ten years, this post looks at more of the key events that shaped Microsoft’s Online Safety Strategy. "Protect Your PC" Consumer campaign The “Protect Your PC” campaign was designed to help people understand a few simple measures they can take to decrease threats from viruses and other malicious attacks. Guidance, tools and information on threats can be found at www.microsoft...
  • Weekly Roundup: April 6, 2012 – Cybersecurity: Go Ahead, Be Defensive!

    Trending Security News Security news stories this week covered a failed attempt by Anonymous to bring down the Internet; latest malware stats for Macs; new government investments in understanding big data trends and building new cybercrime defenses; and eight UK universities who recognize excellence in the field of security science. Here’s our top story and blog picks this week. Let us know what security stories interest you. In the News · Damage Mitigation As The New Defense –...
  • Weekly Roundup: April 13, 2012 – Data Security Trends and Issues

    Trending Security News Security news stories this week highlighted data breaches, tips on computer security, cybersecurity and online safety patterns and practices, and analysis in support and criticism of Cyber Intelligence Sharing And Protection Act (CISPA). Here’s our top news stories and blog picks this week. Let us know what security news stories interest you. In the News Utah medical data breach worse than originally thought; 182,000 people’s information stolen –...
  • Microsoft Active Protections Program and Battling Botnets – TwC Interactive Timeline Part 7

    Continuing the Interactive Timeline series outlining some of the seminal events that have occurred over the last ten years, this post looks at more of the key events that shaped Microsoft’s Security Strategy. Microsoft Active Protections Program In August 2008, Microsoft introduced the Microsoft Active Protections Program (MAPP) to help protect computer users from criminals attempting to exploit software vulnerabilities. MAPP members comprise more than 80 security software providers worldwide who...
  • Weekly Roundup: April 27, 2012 – Tracking the Security Trends: Data Integrity

    Trending Security News Security news stories last week reported the House passed the CISPA bill; CNET reports Mac security ten years behind Microsoft; and infosecurity ran a story about the GAO that testified on Capitol Hill reporting there were 42,887 cybersecurity incidents last year. Here are some of the security news stories and a blog pick from last week. In the News Kaspersky: Mac security is '10 years behind Microsoft' – CNET Survey Finds Secure Sites Not So Secure – Threat...
  • Security Research Community and BlueHat Prize Inception – TwC Interactive Timeline Part 5

    Continuing the Interactive Timeline series outlining some of the seminal events that have occurred over the last ten years, this post looks at more of the key events that shaped the latter part of the first decade of the 2000’s, helping to foster greater collaboration. Security Researcher Community Microsoft engages the security researcher community in many ways including recognizing those who discover software vulnerabilities. Security researchers collaborate on exploits and vulnerabilities with...