Get on-the-go access to the latest insights featured on our Trustworthy Computing blogs.
This article in our series focused on Microsoft’s free security tools is on a tool called Windows Defender Offline. Windows Defender Offline is a standalone software application that is designed to help detect malicious and other potentially unwanted software, including rootkits that try to install themselves on a PC. Once on a PC, this software might run immediately, or it might run at unexpected times. Windows Defender Offline works by scanning an operating system to check the authenticity of any communication the operating system has with the Internet. If there is an application deemed unsafe, it will alert the user and block the contents of the application until the user either accepts or denies the risk.
In part 1 of this series on the threat landscape in Asia and Oceania I focused on Vietnam and India – the two locations with the highest malware infection rates in the region. In this part of the series, I’m focusing on Korea and Japan. Historically Korea has had one of the most active threat landscapes and highest malware infection rates in the world, while Japan has had the opposite.
In the first part of this series on the threat landscape in the Middle East I focused on the threats in Qatar, the location with the largest improvement in malware infection rates in the region. In this part of the series I focus on the Palestinian Authority and Iraq, the two locations with the highest malware infection rates in the region in the second half of 2011.
For years I have heard talk in the industry that much of the counterfeit software available on the Internet was preloaded with malware. How much of the counterfeit software available is preloaded with malware? What type of malware is preloaded on these systems and what does it allow the attackers to do?
In part 1 and part 2 of this series on the threat landscape in Asia and Oceania I focused on Vietnam, India, Korea and Japan. In this third part of the series, I’m focusing on Malaysia and Singapore.
I have visited both of these countries in the past to discuss threats in these locations with customers. Both of these locations typically have malware infection rates (CCM) above the worldwide average. This changed in the third (3Q11) and fourth (4Q11) quarters of 2011 as seen in figure 1. Singapore’s CCM trended down below Malaysia’s in 3Q11 after being above it for all four of the previous quarters.
In the first three parts of this series on the threat landscape in Asia and Oceania I examined threats in Vietnam and India (highest malware infection rates in the region), Japan and Korea (very interesting juxtaposition), and Malaysia and Singapore (malware infection rates trending lower). This final part of the series is on threats found in Australia and New Zealand.
Recently I wrote about the threat landscape in the European Union (part 1, 2, 3) and Africa. This series of articles is focused on threats in select locations in Asia (Vietnam, India, Korea, Malaysia, Singapore, and Japan) and Oceania (Australia and New Zealand). I am focusing on these locations as they were the most active locations in the region during the second half of 2011 (2H11). I omitted China from this analysis as I hope to dedicate an article to it in the future at some point. The primary source of data for this series of articles is the Microsoft Security Intelligence Report volume 12 (SIRv12).
Recently we have published articles on the threat landscape in many different parts of the world including the European Union (part 1, 2, 3), Africa, Asia (part 1, 2, 3) and Oceania. The analysis in these articles is based on data and insights from the Microsoft Security Intelligence Report volume 12 (SIRv12) and previous volumes of the report.
This morning, the Microsoft Security Response Center published its monthly security bulletins. One thing you should do, if you haven’t already, is evaluate your environments for dependencies on certificates with RSA key length less than 1024 bits. In October the bar gets raised on certificate requirements in an effort to help create a safer more trusted Internet for everyone.