Microsoft Security Blog

The official Microsoft blog for discussing industry and Microsoft security topics.

Browse by Tags

  • Blog Post: Phishers Targeting Growing Mobile User Base and Online Services

    We recently published volume 15 of the Microsoft Security Intelligence Report . This volume of the report contains detailed data on the types of phishing attacks Microsoft products helped to block during the first half of 2013. For the first time ever, the report also contains data on phishing attacks...
  • Blog Post: And the Gold Medal Goes to … Finland!

    The closing ceremonies are quickly approaching in Sochi, Russia, with ice skaters, skiers, curlers and other world-renowned athletes racing to stand atop the podium. But one nation is already seeing gold: Finland has once again prevailed as the country with the lowest malware infection rates. We’re...
  • Blog Post: Japan Skates into Second Place

    Skaters are speeding around Sochi ice rinks this week at the 2014 Winter Games, capturing the world’s attention with their grace and athletic prowess. Our blog series also skates along to another medal round, as we honor Japan with our second-place silver medal for its exemplary approach to managing...
  • Blog Post: Norway Sweeps In With Bronze Medal

    Norway could dominate cross-country skiing events this week, thanks to several renowned athletes already making headlines. Whether its skiers racing past their competition or not, Norway’s cross-country efforts in computer security are already victorious, scooping up Microsoft’s bronze medal...
  • Blog Post: RSA Conference 2014: Internet Growth Brings New Opportunities and New Challenges

    It’s hard to believe RSA Conference USA 2014 is just a few weeks away. Microsoft has been an active participant at RSA Conference for over a decade now and it’s great to see how far the awareness and importance of IT security has come. Over the past decade, attendance has grown dramatically...
  • Blog Post: Cleanest Countries/Regions Jump to the Top of Our Podium

    As world-class winter athletes compete on the slopes of Russia today, we decided to celebrate our own global medalists — the countries/regions which had the least amount of malware infections in the first half of 2013. We have produced the Microsoft Security Intelligence Report (SIR) for many...
  • Blog Post: Threats in the Cloud – Part 2: Distributed Denial of Service Attacks

    Organizations that operate or use Internet connected services such as websites, portals and Cloud services need to be aware of threats that can disrupt service. In the first part of this series I discussed Domain Name System (DNS) attacks and their potential to disrupt services and infect large volumes...
  • Blog Post: Threats in the Cloud – Part 1: DNS Attacks

    The popularity of Cloud services has increased immensely over the past few years. Transparency into how these services are architected and managed has played a big role in this growth story. Many of the CISOs I talk to about leveraging Cloud services want insight into the types of threats that Cloud...
  • Blog Post: Drive-by Download Attacks: Examining the Web Server Platforms Attackers Use Most Often

    We have included data on drive-by download attacks in numerous past volumes of the Microsoft Security Intelligence Report . But in the latest volume of the report, volume 15, we published some new data that we haven’t included in the report before - the relative prevalence of drive-by download...
  • Blog Post: The Threat Landscape in South America: Examining Brazil’s Dramatic Improvement

    This article, part 2 of a series on the threat landscape in South America, focuses on Brazil. Brazil has had one of the most active threat landscapes in the world for many years. As seen in Figure 1, in the first quarter of 2011 (1Q11), Brazil’s infection rate (19.18) was over double that of the...
  • Blog Post: Ransomware is on the Rise, Especially in Europe

    The recently published Microsoft Security Intelligence Report (SIRv15) contains a section on ransomware. Ransomware is a type of malware that is designed to render a computer or its files unusable until the computer user pays the demanded amount of money to the attacker. It often masquerades as an official...
  • Blog Post: Microsoft Security Intelligence Report desktop application updated with over 750 pages of data

    A few months ago we launched the Microsoft Security Intelligence Report (SIR) application that was designed to provide customers with an enhanced way to access the vast amount of threat intelligence contained in the SIR. The SIR app makes it easy to find, copy and share data from the Microsoft Security...
  • Blog Post: The Threat Landscape in the European Union at RSA Conference Europe 2013

    We had the opportunity to present new findings from the Microsoft Security Intelligence Report volume 15 at RSA Conference Europe last week in Amsterdam. Jeff Jones and I presented some of the new data from the report. In our session we discussed some of the global threats from the report, as well...
  • Blog Post: The Threat Landscape in South America

    One region of the world I haven’t written extensively about before is South America. Recently I had the opportunity to visit a couple of countries in South America to visit customers and discuss the threats they see in their environments. This is part 1 in a series of articles that will focus on...
  • Blog Post: Microsoft Security Intelligence Report Volume 15 Now Available!

    This morning, at the RSA Europe conference, Mike Reavey, General Manager for Trustworthy Computing delivered a keynote in which he announced the release of the Microsoft Security Intelligence Report volume 15 (SIRv15). The Microsoft Security Intelligence Report is the most comprehensive cybersecurity...
  • Blog Post: The Threat Landscape in South America: Argentina and Uruguay

    In this third part of our series on the threat landscape in South America, we examine threats in Argentina and Uruguay. Of the locations represented in Figure 1, Argentina and Uruguay are among the locations with the lowest malware infection rates in South America. Argentina As seen in Figure 1, Argentina’s...
  • Blog Post: The Threat Landscape in South America: Chile and Colombia

    In this fourth and final part of our series on the threat landscape in South America, we examine threats in Chile and then Colombia. As illustrated in Figure 1, both of these regions have had periods where their malware infection rates were above the worldwide average, and have more recently trended...
  • Blog Post: Microsoft Cybersecurity Report: Top 10 Most Wanted Enterprise Threats

    In my travels abroad over the years, I have had the great opportunity to meet with many enterprise customers to discuss the evolving threat landscape. In addition to helping inform customers, these meetings have provided me with an opportunity to learn more about how customers are managing risk within...