Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Security informations brought to you by the Swiss Security Team.
Black Hat: new operating systems security metric
At the Black Hat Security Conference currently taking place in Amsterdam, researchers from the...
Author: Microsoft Swiss Security Team Date: 04/03/2008
Microsoft scoops up rootkit finder Komoku
The start-up's rootkit detection technology will be added into Microsoft's Windows Live OneCare and...
Author: Microsoft Swiss Security Team Date: 03/29/2008
Spyware authors offer dollars for downloads
Spyware authors are offering financial rewards to botnet operators and other cyber-criminals who...
Author: Microsoft Swiss Security Team Date: 03/29/2008
IBM: Apple Crumble @ Blackhat
In addition to my previous blog post:...
Author: Microsoft Swiss Security Team Date: 03/29/2008
Black Hat: Who patches security holes faster, Microsoft or Apple?
Apple's teasing commercials that imply its software is safer than Microsoft's may not quite match...
Author: Microsoft Swiss Security Team Date: 03/29/2008
Sun and Apple Updates – A Sheer Nuisance!!
From Roger's blog...
Author: Microsoft Swiss Security Team Date: 03/26/2008
Inside the Twisted Mind of the Security Professional
Bruce Schneier: "Uncle Milton Industries has been selling ant farms to children since 1956. Some...
Author: Microsoft Swiss Security Team Date: 03/26/2008
Security researchers show how to hook phishers
Security researchers are cooking up tactics for beating phishing fraudsters at their own game....
Author: Microsoft Swiss Security Team Date: 03/26/2008
Business biometrics raises ID theft risk
The commercial use of biometrics will become widespread in five years, but is not without security...
Author: Microsoft Swiss Security Team Date: 03/26/2008
Anatomy of a SQL Injection Incident
Blog Posting from Neil Carpenter: "A number of people are reporting that 10K+ Web sites have been...
Author: Microsoft Swiss Security Team Date: 03/26/2008
Security guide to customs-proofing your laptop
If you travel across national borders, it's time to customs-proof your laptop. Customs officials...
Author: Microsoft Swiss Security Team Date: 03/26/2008
New Book: The New School of Information Security
New Book: The New School of Information Security by Adam Shostack and Andrew Stewart About the...
Author: Microsoft Swiss Security Team Date: 03/13/2008
Dropping 22TB of patches on 6,500 PCs in 4 hours: BitTorrent
Apparently, software updates are getting so big these days that simply downloading them from a...
Author: Microsoft Swiss Security Team Date: 03/13/2008
Generate Your Own Security Code Review Checklist Document
In this post from the ACE Team, they show how to generate Security Code Review Checklist using...
Author: Microsoft Swiss Security Team Date: 03/12/2008
Internet Explorer 8 Readiness Toolkit
We just made Internet Explorer 8 Beta 1 available. This could be important if you are developing web...
Author: Microsoft Swiss Security Team Date: 03/12/2008
Microsoft buys U-Prove technology
Microsoft Corp. hopes to beef up online privacy with the acquisition of the U-Prove technology, the...
Author: Microsoft Swiss Security Team Date: 03/12/2008
Cisco hops onto patching treadmill
Cisco has taken a leaf out of Microsoft's book by adopting a regular patch release cycle. However,...
Author: Microsoft Swiss Security Team Date: 03/12/2008
Model predicts chance of software flaws
Researchers from a German university have developed a model to predict programming errors in...
Author: Microsoft Swiss Security Team Date: 03/12/2008
New Method IDs Phishing, Malicious Domains
At a closed-door security summit hosted on Yahoo’s Sunnyvale campus last week, a researcher...
Author: Microsoft Swiss Security Team Date: 03/12/2008
A guide to basic computer forensics
While some investigations rely on highly trained professionals using expensive tools and complex...
Author: Microsoft Swiss Security Team Date: 03/12/2008
APWG Releases Phishing Activity Trends
The Anti-Phishing Working Group (APWG) has just released their Phishing Activity Trends Report for...
Author: Microsoft Swiss Security Team Date: 03/12/2008
Ballmer Outlines Vision For Next Computing Revolution
The rise of PCs, graphical user interfaces, the Internet, and Web 2.0 technologies have obviously...
Author: Microsoft Swiss Security Team Date: 03/10/2008
Identity management critical for security, government IT shops say
A majority of government IT organizations say identity management is very important to securing...
Author: Microsoft Swiss Security Team Date: 03/07/2008
Study: Consumers Don't Use Anti-Phishing Defenses
"Across the globe, Windows Internet Explorer 7 has more than 100 million users seeing green,"...
Author: Microsoft Swiss Security Team Date: 03/07/2008
Windows XP Service Pack 3 Overview
Windows XP Service Pack 3 (SP3) includes all previously released updates for the operating system....
Author: Microsoft Swiss Security Team Date: 02/28/2008
Windows Server 2008 Security Guide released
The Windows Server 2008 Security Guide provides customers with best practices, predefined security...
Author: Microsoft Swiss Security Team Date: 02/28/2008
The First Step on the Road to More Secure Software is admitting you have a Problem
Michael Howard on SDL and the need for it; comments onJeff Jones blogs. See SDL blog:...
Author: Microsoft Swiss Security Team Date: 02/27/2008
Windows Server 2008 Resource Kit
Last Friday the last of the Windows Server 2008 Security Resource Kit finally went to press! This...
Author: Microsoft Swiss Security Team Date: 02/27/2008
'Out of office' messages turned into spam relays
Spammers have found a new trick that gets around many current anti-spam filters: abusing the "out of...
Author: Microsoft Swiss Security Team Date: 02/27/2008
Microsoft's glasnost on interoperability means more bugs [?]
Microsoft's decision last week to let everyone snoop through its software secrets means...
Author: Microsoft Swiss Security Team Date: 02/27/2008
E-mail typosquatting poses leakage threat
Companies and political organizations should put more effort into registering mis-typed versions of...
Author: Microsoft Swiss Security Team Date: 02/27/2008
Hacking the lobby telephone
Two security researchers at ShmooCon demonstrated on Saturday how a laptop connected to a VoIP...
Author: Microsoft Swiss Security Team Date: 02/27/2008
Swissdialogue / MS Switzerland Citizenship blog entry: Kriminelle Energie ist überall – auch im Internet
For the german speaking readers, also a link to my citizenship blog entry: "Kriminelle Energie ist...
Author: Microsoft Swiss Security Team Date: 02/21/2008
ITU study group Q.22/1 - Report on best practices for a national approach to cybersecurity
A management framework for organizing national cybersecurity efforts:...
Author: Microsoft Swiss Security Team Date: 02/21/2008
Introducing SAFECode [Michael Howard]
SAFECode, the Software Assurance Forum for Excellence in Code, introduced its first white paper,...
Author: Microsoft Swiss Security Team Date: 02/21/2008
Encryption Brings New Risks, Experts Say
Security workers warn that encrypting stored data doesn't truly protect it, and you're fooling...
Author: Microsoft Swiss Security Team Date: 02/21/2008
Security for the youngest internet users - Security4Kids
Have you ever heard about www.security4kids.ch? If not, visiting the site should be one of your...
Author: Microsoft Swiss Security Team Date: 02/21/2008
Microsoft Forefront Client Security benchmark test (West Coast Lab)
Microsoft Corporation commissioned West Coast Labs (WCL) to carry out a series of performance...
Author: Microsoft Swiss Security Team Date: 02/14/2008
German Police Creating LE Trojan
German cops are pushing ahead with controversial plans, yet to be legally approved, to develop...
Author: Microsoft Swiss Security Team Date: 02/14/2008
CIA Monitors YouTube For Intelligence
U.S. spies are looking increasingly online for intelligence and they've become major consumers of...
Author: Microsoft Swiss Security Team Date: 02/14/2008
Europe still top source of spam
European spam networks have pumped out more unsolicited e-mail than those in the U.S. for the third...
Author: Microsoft Swiss Security Team Date: 02/07/2008
Minimizing User Rights Can Increase Security
Taking a least-privilege approach to user accounts is a key part of any in-depth defense strategy,...
Author: Microsoft Swiss Security Team Date: 02/07/2008
EISAS – European Information Sharing and Alert System - A Feasibility Study
ENISA is presenting the first feasibility study on a European Information Sharing and Alert System...
Author: Microsoft Swiss Security Team Date: 02/07/2008
Big trouble with teen hackers
Teenagers, including children as young as eleven and twelve years old, are increasingly becoming...
Author: Microsoft Swiss Security Team Date: 02/07/2008
Remote Workers Still Living Dangerously, Cisco Study Says
If it seems that -- despite your company's best efforts to educate users about security -- users are...
Author: Microsoft Swiss Security Team Date: 02/07/2008
Wireless phone headsets insecure?
Analysis: Wireless phone headsets of the kind beloved by Wall Street executives and high-end law...
Author: Microsoft Swiss Security Team Date: 02/07/2008
Forensics Plan Guide (GIAC)
The Forensics Plan Guide defines the basic elements of a Forensic Plan from the first initial...
Author: Microsoft Swiss Security Team Date: 02/04/2008
Microsoft adds new Anti-Exploit APIs into Windows
Microsoft has announced plans to add new anti-exploitation APIs into Windows Vista SP1, Windows XP...
Author: Microsoft Swiss Security Team Date: 02/04/2008
Download: Windows Vista One Year Vulnerability Report
Excerpt of a blog by Jeff Jones: Windows Vista shipped to business customers on the last day of...
Author: Microsoft Swiss Security Team Date: 01/29/2008