Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Security informations brought to you by the Swiss Security Team.
Conficker's First Birthday Looms - Seven Million IPs Still Infected
As Conficker approaches the first anniversary of its appearance in the wild, the Shadowserver...
Author: Microsoft Swiss Security Team Date: 11/06/2009
Microsoft Security Intelligence Report volume 7 (January - June 2009) released
The Microsoft Security Intelligence Report (SIR) provides an in-depth perspective on the changing...
Author: Microsoft Swiss Security Team Date: 11/03/2009
Phishing, Worms Spike This Year, Say Microsoft and McAfee
Scammers are targeting social networks with phishing scams and relying more heavily on worms and...
Author: Microsoft Swiss Security Team Date: 11/03/2009
Windows 7 Security Story May Appeal to Enterprises
The Windows 7 security story has three main chapters that have received a fair amount of attention:...
Author: Microsoft Swiss Security Team Date: 11/02/2009
Free Microsoft Security Tool Locks Down Buggy Apps (EMET)
EMET, short for Enhanced Mitigation Evaluation Toolkit, allows developers and administrators to add...
Author: Microsoft Swiss Security Team Date: 11/02/2009
Cybersecurity Today: The Wild, Wild West
If you purchased a brand new computer today with all the latest security software and plug it into...
Author: Microsoft Swiss Security Team Date: 09/28/2009
Inside the Password-Stealing Business: The Who and How of Identity Theft
With shopping and banking transactions occurring primarily online today, password stealing has...
Author: Microsoft Swiss Security Team Date: 09/28/2009
Where in the World do Viruses come from?
The U.S. continues to dominate as the main source of the world's viruses, producing 15.9 percent of...
Author: Microsoft Swiss Security Team Date: 09/17/2009
Hacking Your Life (oh oh...)
A Virginia woman discovered that her married boyfriend had other girlfriends, and she decided to...
Author: Microsoft Swiss Security Team Date: 09/17/2009
Microsoft SDL team releases new security tools
The Security Development Lifecycle (SDL) team at Microsoft released two security testing tools....
Author: Microsoft Swiss Security Team Date: 09/17/2009
SANS Outlines the Top Cyber Security Risks
SANS released the "Top Cyber Security Risks" report which covers March-August 2009. The report...
Author: Microsoft Swiss Security Team Date: 09/17/2009
Top 100 Virus-Infected Web Sites Exposed
Simply visiting one of the "Top 100 Dirtiest" Web sites - without downloading or even clicking...
Author: Microsoft Swiss Security Team Date: 09/05/2009
New Attack Cracks Common Wi-Fi Encryption in a Minute
Computer scientists in Japan say they've developed a way to break the WPA encryption system used in...
Author: Microsoft Swiss Security Team Date: 09/05/2009
Windows Exploit Programming Primer
From SecurityTube: "We kick started the exploit code research series on SecurityTube by creating the...
Author: Microsoft Swiss Security Team Date: 09/05/2009
Introduction to Malware Analysis — Free Webcast
From Lenny Zeltser: "My popular malware analysis course has helped IT administrators, security...
Author: Microsoft Swiss Security Team Date: 09/05/2009
The Phishing Guide: Understanding and Preventing Phishing Attacks
This paper [PDF] covers the technologies and security flaws phishers exploit to conduct their...
Author: Microsoft Swiss Security Team Date: 09/05/2009
Security Risk as People Use Same Password on All Websites
The research reveals that nearly half (46 percent) of Britons use the same password to login to...
Author: Microsoft Swiss Security Team Date: 09/05/2009
Researchers Find a New Way to Attack the Cloud
Amazon and Microsoft have been pushing cloud-computing services as a low-cost way to outsource raw...
Author: Microsoft Swiss Security Team Date: 09/05/2009
Security Guru Calls Chrome OS's Security Claims "Idiotic"
Noted security guru Bruce Schneier, chief technologist at BT, has scoffed at Google's claims about...
Author: Microsoft Swiss Security Team Date: 07/13/2009
Majority of vulnerabilities now being exploited
The number of exploits being written to target specific software vulnerabilities could be at...
Author: Microsoft Swiss Security Team Date: 07/13/2009
Protecting your computer while travelling
Protecting computer equipment is something that everyone should be concerned with today. It seems...
Author: Microsoft Swiss Security Team Date: 05/18/2009
Windows 7 and Security
As Windows 7 is not too far away and as many are allready using or testing Windows 7, here a list of...
Author: Microsoft Swiss Security Team Date: 03/18/2009
C64 as a webserver?! ;-)
An entire Web site has been 100% developed on the Commodore 64. The little keyboard box you see...
Author: Microsoft Swiss Security Team Date: 03/02/2009
Passwords - once again...
Popular Passwords Include ‘1234' and ‘password’ When 28,000 log-in details stolen from a well-known...
Author: Microsoft Swiss Security Team Date: 03/02/2009
Top 9 Dirty Tricks Scammers Use
What the average guy might call a con is known in the security world as social engineering. Social...
Author: Microsoft Swiss Security Team Date: 02/25/2009
Conficker Advisories
Microsoft Conficker guidance page for IT Professionals and those focused on security in the...
Author: Microsoft Swiss Security Team Date: 02/09/2009
Slow And Silent Targeted Attacks On The Rise
And another one in the same direction: The most determined cyber criminals don't necessarily work...
Author: Microsoft Swiss Security Team Date: 01/12/2009
The Latest Microsoft Security Intelligence Report (v5)
The Microsoft Security Intelligence Report (SIR) provides an in-depth perspective on the changing...
Author: Microsoft Swiss Security Team Date: 01/12/2009
Trojans Dominated Malware Threats in Dec. '08
Sunbelt Software has released its monthly data dump that charts the most commonly observed malware...
Author: Microsoft Swiss Security Team Date: 01/12/2009
Microsoft Security Bulletin MS08-078 – Critical avaiable now!
Microsoft Security Bulletin MS08-078 – Critical is now avaiable, patches are there and ready for...
Author: Microsoft Swiss Security Team Date: 12/17/2008
Internet Explorer security levels compared
As a couple of people are looking at their IE currently, I found some interesting information on...
Author: Microsoft Swiss Security Team Date: 12/16/2008
Security Advisory 961051 - More information
Microsoft revised the Workarounds section of Security Advisory 961051. The Security Vulnerability...
Author: Microsoft Swiss Security Team Date: 12/16/2008
Microsoft support lifecycle for service Packs
Perhaps a good idea to do some end-of-year cleanup! You can find what product services packs are...
Author: Microsoft Swiss Security Team Date: 12/16/2008
New Security Development Lifecycle (SDL) Programs
As part of its commitment to make the SDL more accessible to every developer, Microsoft is...
Author: Microsoft Swiss Security Team Date: 11/24/2008
Out of band security update MS08-067
Microsoft released the announced out of band security update MS08-067. Please read the bulletin...
Author: Microsoft Swiss Security Team Date: 10/27/2008
Microcosm of a massive security problem
Blog Post by Jon Oltsik: A few weeks ago, I gave a presentation to a number of companies about the...
Author: Microsoft Swiss Security Team Date: 10/23/2008
IT security guide: Understanding cyber-risks means knowing what questions to ask
A good place for senior executives to start in trying to understand their companies' financial...
Author: Microsoft Swiss Security Team Date: 10/23/2008
Chinese surfers see red over Microsoft black-outs
Chinese Internet users have expressed fury at Microsoft's launch of an anti-piracy tool targeting...
Author: Microsoft Swiss Security Team Date: 10/23/2008
Do You Need A Secure Flash Drive?
PCMAG.COM: "I've long been a big fan of USB flash drives for carrying around the data that I need on...
Author: Microsoft Swiss Security Team Date: 10/20/2008
Why Technology Isn't The Answer To Better Security
"Too many organizations still lack coherent, enforced and forward-thinking security processes, our...
Author: Microsoft Swiss Security Team Date: 10/20/2008
Internet Explorer 8 (beta2) released
Last week Microsoft released IE8 Beta2, the faster, easier and safer successor of the existing...
Author: Microsoft Swiss Security Team Date: 09/03/2008
The Open Computer Forensics Architecture (OCFA)
The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework built by...
Author: Microsoft Swiss Security Team Date: 08/29/2008
Tech giants team for online ID cards
A group of software and online payment companies are teaming up to find a better way than passwords...
Author: Microsoft Swiss Security Team Date: 08/29/2008
Microsoft Forefront Integration Kit for Network Access Protection
The Microsoft Forefront Integration Kit for Network Access Protection provides a way for two...
Author: Microsoft Swiss Security Team Date: 08/29/2008
Microsoft ISA Server Service Pack 1 (SP1) released
List of problems that are fixed in Internet Security and Acceleration Server 2006 Service Pack...
Author: Microsoft Swiss Security Team Date: 07/07/2008
Microsoft Malware Removal Tool: Two million password stealers fingered
Microsoft's Malicious Software Removal Tool - a program that removes malware from Windows machines -...
Author: Microsoft Swiss Security Team Date: 06/25/2008