Microsoft Security Blog

The official Microsoft blog for discussing industry and Microsoft security topics.

Browse by Tags

  • Blog Post: Trustworthy Computing: Learning About Threats for Over 10 Years - Part 3

    In the first two parts of this series ( part 1 , part 2 ) I explored some of the ways that the threat landscape has evolved over the past decade and introduced a new special edition Microsoft Security Intelligence Report (SIR) called “ The evolution of malware and the threat landscape – a...
  • Blog Post: Weekly Roundup : Dec 30, 2011 : Taking a Look Back at Some of the Year’s Top Security Stories

    Trending Security News In August we started posting the Weekly Roundup to share trending security news from many viewpoints. Week by week the flow of news provides insights into the ever growing challenges faced in the global efforts to secure cyberspace, as well as the progress made and security...
  • Blog Post: U.S. ISPs Commit to Help Protect Consumers from Botnets

    Botnets and other malware continue to threaten the computing environment online that our society relies upon for communication, commerce and collaboration. In the past several years, we along with industry partners have made great strides toward containing and even pushing back against security threats...
  • Blog Post: Weekly Roundup : Sep 23, 2011 : Rustock Botnet Case Goes to the FBI

    Trending Security News The week ended on a high note with news that Microsoft had successfully completed its civil action in the Rustock botnet case and had passed along all of its evidence to the FBI for possible criminal investigation. CNET led the coverage with its Microsoft hands Rustock botnet case...
  • Blog Post: ENISA Reports on Fighting Botnets

    Over the past year, we have been looking at how to apply concepts from public health to address internet security. Last week I noticed two new reports published by the European Network and Information Security Agency (ENISA) on the topic of botnets. The reports make a key observation that “research on...
  • Blog Post: Microsoft Gives Rustock Botnet Evidence to the FBI

    It was great to read this morning about Microsoft successfully concluding its civil case against the Rustock botnet operators, and referring the matter, along with all the evidence it has discovered, to the FBI for criminal review. Readers may recall the first report on the breakthrough back in March...
  • Blog Post: Counterfeit Software Preloaded with Malware and the Link to Botnets: Operation b70

    For years I have heard talk in the industry that much of the counterfeit software available on the Internet was preloaded with malware. How much of the counterfeit software available is preloaded with malware? What type of malware is preloaded on these systems and what does it allow the attackers to...
  • Blog Post: The Threat Landscape in Mexico

    Many customers I have talked to who have operations in Mexico have asked for insight into the threat landscape there. The threat landscape in Mexico has been quite active and in this article I try to provide some insight into what has been happening there based on data from the Microsoft Security Intelligence...
  • Blog Post: Weekly Roundup : Sep 16, 2011 : Bot Net Armies and Heidi Klum

    Trending Security News Sometimes the juxtaposition of stories you read is kind of interesting. Over at Network World, Tim Greene authored an article Bot army being assembled, awaiting orders . While CNET News reported Heidi Klum the 'most dangerous' celeb on the Net . It appears as if Klum , a model...
  • Blog Post: Microsoft Takedown of Rustock Botnet

    Yes, now that the court has unsealed the case, Microsoft can comment on the takedown of the large, notorious and complex botnet known as Rustock. This operation, known as Operation b107, is the second high-profile takedown in Microsoft’s joint effort between the Microsoft Digital Crimes Unit...
  • Blog Post: Battling the ZBot Threat

    The Security Intelligence Report team at Microsoft released a new special edition report called “Battling the ZBot Threat.” Win32/Zbot is a family of password-stealing trojans that contain backdoor functionality which allows attackers to control infected computers remotely through illicit networks called...