Microsoft Security Blog

The official Microsoft blog for discussing industry and Microsoft security topics.

June, 2012

  • The Threat Landscape Shifts Significantly in the European Union - Part 3

    In the first two parts (part 1, part 2) of this three part series I focused on the locations in the European Union (EU) that had the highest malware infection rates and/or saw the highest increases in malware infection rates in the second half of 2011.  In this final installment of the series I focus on the countries/regions in the EU that have the lowest malware infection rates and some insights that other locations with higher infection rates might find helpful.

  • The Threat Landscape Shifts Significantly in the European Union - Part 2

    In part 1 of this series on the threat landscape in the European Union in the second half of 2011, I examined the threats in the location with the highest malware infection rate, Romania.  In this segment of the series I will examine what is happening in the EU member states that have seen the biggest increases in malware infection rates in the last half of 2011, Austria, Germany, Italy, and the Netherlands.

  • The Threat Landscape Shifts Significantly in the European Union - Part 1

    Recently I spoke at the Microsoft EU Cybersecurity & Digital Crimes Forum 2012 in Brussels.  I provided an in-depth briefing on some of the significant shifts in threat landscape in the EU during the second half of 2011.  I will be sharing some of the key findings of this analysis in a short series of articles. Of the 27 member states of the European Union (EU) we have identified the locations with the highest malware infection rates.  We determine this using a measure called computers cleaned per mille (CCM).  The CCM is the number of computers found infected with malware for every 1,000 systems scanned by the Microsoft Malicious Software Removal Tool (MSRT) which runs on over 600 million systems worldwide on a monthly basis.

  • Warning : Fake Microsoft notification allegedly from Windows Live

    Okay, so there are about a million social techniques being used in email to get your attention and entice you to click on some bad link, but since this one purports to be from Microsoft, I thought I’d post a quick warning and do a bit of digging, since it is the first of these that I’ve gotten and I received 3 variations (different alleged friends on the invite) over the weekend. First, let’s take a quick look at the Fake email First, note that the “From:” address isn’t even valid.  If you weren...
  • Weekly Roundup: June 8, 2012 – Not On My Security Watch

    Trending Security News This week in security news, stories report on the LinkedIn hack, big data, cyber legislation in process, and the consummerization of IT on BYOD trends. Here are some of the security news stories and our two blog picks this week. We focus on highlighting a variety of computer security and cybersecurity news and trends that impact trust in computing. We would love to hear from you. Please feel free to comment below and let us know what news stories you’re interested in...
  • Collaborating On Ways to Advance Internet Health

    Almost exactly one year ago, I attended the EastWest Institute’s Worldwide Cybersecurity Summit in London and in a working group of industry leaders, distinguished scientists and key government officials we met to discuss collective ways to improve global internet health. The group started by looking at the opportunities and limitations the public health model offered as a potential solution or inspiration to a solution for this problem. We then spent the remainder of the afternoon breaking...