Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Security informations brought to you by the Swiss Security Team.
Windows Vista 64Bit non-signed driver install tool (atsiv) blocked
The third party kernel mode driver named “Atsiv” provides a mechanismto load code that conflicts...
Author: Microsoft Swiss Security Team Date: 08/13/2007
Hackers are giving up hacking
Hackers are increasingly giving up hacking, why? Because its become boring, there is no glits and...
Author: Microsoft Swiss Security Team Date: 07/27/2007
Animated film about malware and how to get hacked easely
This movie shows how easily you can be a victim of a hacker if you have not taken care of the proper...
Author: Microsoft Swiss Security Team Date: 07/27/2007
The Rise of Antiforensics
New, easy to use antiforensic tools make all data suspect, threatening to render computer...
Author: Microsoft Swiss Security Team Date: 07/27/2007
Windows Vista Integrity Mechanism - Technical Reference
Peter Brundrett, the Product Manager behind the integrity levels work in Windows Vista has written...
Author: Microsoft Swiss Security Team Date: 07/12/2007
Microsoft security threat and research portal
Microsoft now has its own security threat and research portal: We launched officially version 1 of...
Author: Microsoft Swiss Security Team Date: 07/12/2007
Meet the Next-Gen Web Worm
At the Black Hat conference next month, Hoffman and fellow researcher John Terrill will demonstrate...
Author: Microsoft Swiss Security Team Date: 07/12/2007
Vulnerability Auctions
A group of security professionals launched this week what they hope will become the eBay of security...
Author: Microsoft Swiss Security Team Date: 07/12/2007
Cyber crime on Second Life
As Second Life creators at LindenLab stated on SL homepage: "there are as many opportunities for...
Author: Microsoft Swiss Security Team Date: 07/04/2007
Malware finds a new home
In many cases, mass-mailing malware is now inefficient due to better protection mechanism and the...
Author: Microsoft Swiss Security Team Date: 07/04/2007
Exploring The Windows Firewall
Mobility has changed computer threats and the techniques that guard against them. As laptops wander...
Author: Microsoft Swiss Security Team Date: 06/30/2007
Keys to Protecting Data with BitLocker Drive Encryption
BitLocker serves two very important purposes: it provides both full-volume data encryption and a way...
Author: Microsoft Swiss Security Team Date: 06/30/2007
Take a Tour Through the Features and User Interface of Forefront Client Security
Microsoft Forefront Client Security provides three important functions: protection, control, and...
Author: Microsoft Swiss Security Team Date: 06/30/2007
The Struggle to Protect Enterprise Data
The problem of enterprise data protection is so big, companies have just begun wrapping their arms...
Author: Microsoft Swiss Security Team Date: 06/30/2007
Inside Windows Vista User Account Control
User Account Control (UAC) is an often misunderstood feature in Windows Vista, see online article by...
Author: Microsoft Swiss Security Team Date: 06/28/2007
Multiple password policies in Active Directory
With Windows Server 2008 ("Longhorn"), it will be possible for the first time to have different...
Author: Microsoft Swiss Security Team Date: 06/28/2007
The new Advanced Group Policy Management (AGPM)
The new Advanced Group Policy Management (AGPM) tool from Microsoft, by Derek Melber....
Author: Microsoft Swiss Security Team Date: 06/28/2007
Profiling an Operating System
Very interesting online article about the profiling of an opearing system....
Author: Microsoft Swiss Security Team Date: 06/28/2007
How Software is Built - Interview with Michael Howard
How Software is Built - Interview with Michael Howard, senior security program manager in the...
Author: Microsoft Swiss Security Team Date: 06/28/2007
DNS Publishing Scenarios (with ISA Server)
DNS issues come up quite a bit on web boards and mailing list. Recently there have been a flurry of...
Author: Microsoft Swiss Security Team Date: 06/28/2007
A push to standards for network forensics
A push to standards for network forensicsBy Beth Rosenberg, Network World, 06/20/07 Digital...
Author: Microsoft Swiss Security Team Date: 06/21/2007
Cybersecurity standards developments guidance to cybersecurity architects
New online tool charts cybersecurity standards developments essential guidance to cybersecurity...
Author: Microsoft Swiss Security Team Date: 06/21/2007
Uncover security design flaws using the STRIDE approach
The Security Development Lifecycle (SDL) threat modeling process has evolved over the last few years...
Author: Microsoft Swiss Security Team Date: 06/21/2007
Windows Live ID vulnerability (comments and status)
Microsoft has become aware of a bug in the e-mail verification portion of the registration process...
Author: Microsoft Swiss Security Team Date: 06/21/2007
Security Tip: Read the EULA… No, Really Read It! ;-)
Data protection policies need to be well thought out and consider not only the systems in direct...
Author: Microsoft Swiss Security Team Date: 06/16/2007
Privacy resources update
Privacy Guidelines for Developing Software Products and ServicesIn response to requests from...
Author: Microsoft Swiss Security Team Date: 06/16/2007
Data Encryption Toolkit for Mobile PCs
The Data Encryption Toolkit for Mobile PCs provides tested guidance and powerful tools to help...
Author: Microsoft Swiss Security Team Date: 06/16/2007
Information Operations and Cyberwar: Capabilities and Related Policy Issues
A good overview of information warfare:https://www.fas.org/irp/crs/RL31787.pdf Urs
Author: Microsoft Swiss Security Team Date: 06/15/2007
Spammers establishing use of artificial intelligence
Though security industry experts were freely predicting the death of spam several years ago, the...
Author: Microsoft Swiss Security Team Date: 06/15/2007
Forefront Next Generation - "Stirling"
As I have mentioned in a blog entry yesterday, we have officially launched the Forefront and System...
Author: Microsoft Swiss Security Team Date: 06/14/2007
Microsoft Security Intelligence Report (H2 2006)
We published the second Security Intelligence Report. Now, you might ask, why this is significant....
Author: Microsoft Swiss Security Team Date: 06/14/2007
Microsoft Malware Protection Portal (preview)
We have released a preview of our Malware Protection Portal, which will go live this summer.You can...
Author: Microsoft Swiss Security Team Date: 06/14/2007
The Bluetooth Keyboard Mystery: Solved. - Michael Howard [FUN]
In a IT world, it's not the gardener, it's the cleaner!!! Once again... Funny story about a...
Author: Microsoft Swiss Security Team Date: 06/14/2007
Launch of Microsoft Forefront and Systemcenter in Switzerland
Take control! We have yesterday officially launched the Microsoft Forefront and the Microsoft System...
Author: Microsoft Swiss Security Team Date: 06/14/2007
Operation BOTROAST - Over 1 Million Potential Victims of Botnet Cyber Crime
Today the Department of Justice and FBI announced the results of an ongoing cyber crime initiative...
Author: Microsoft Swiss Security Team Date: 06/14/2007
Windows Server 2003 and Windows XP: CC EAL4 achieved
The validation for the two products are finished and we got the EAL4 certification from Common...
Author: Microsoft Swiss Security Team Date: 06/08/2007
Security Development Lifecycle (SDL) Blog online
The security engineering team at Microsoft startet a new blog around the SDL! If you're interested,...
Author: Microsoft Swiss Security Team Date: 05/07/2007
Microsoft Touts Trust-Based ID
About the future of Active Directory and Federation Services: "Microsoft recently laid out a future...
Author: Microsoft Swiss Security Team Date: 05/04/2007
How to get a password? Just ask...
Network managers are fighting a lonely battle on security with the majority of users and directors...
Author: Microsoft Swiss Security Team Date: 04/24/2007
Top ten Internet crimes 2006 (Internet Crime Report 2006)
I really can't believe that there are still people who get trapped by those Nigerian fraud letter......
Author: Microsoft Swiss Security Team Date: 04/24/2007
Computer Forensic Software Tools Downloads
Software tools that have been found to be useful in forensic examination of recovered evidence....
Author: Microsoft Swiss Security Team Date: 04/19/2007
Data Encryption Toolkit for Mobile PCs - Security Analysis
This guide, the Microsoft Data Encryption Toolkit for Mobile PCs Security Analysis, provides...
Author: Microsoft Swiss Security Team Date: 04/11/2007
NIST Releases Report on Biometrics Advances
Improved algorithms used in facial recognition software programs have improved the success of such...
Author: Microsoft Swiss Security Team Date: 04/11/2007
Hotfix4Hotfix (MS07-017/KB925902) Update
The out-of band hotfix has created problems in combination with the RealTek Soundchip and some other...
Author: Microsoft Swiss Security Team Date: 04/07/2007
An inside look into building and releasing MS07-017
Mike Reavey from MSRC on the history of...
Author: Microsoft Swiss Security Team Date: 04/05/2007
Out of band patch release on April, 3rd. 2007
As you probably have seen this allready, as a reminder: On 03 April 2007 Microsoft is planning to...
Author: Microsoft Swiss Security Team Date: 04/02/2007
SPAM mail from admin@microsoft.com
We got an increase on helpdesk calls in different subsidiaries with regards to a mail that is...
Author: Microsoft Swiss Security Team Date: 04/02/2007
Windows Vista - 90-days vulnerability report
February 28th marked 90 days that Windows Vista had been available to business customers. December...
Author: Microsoft Swiss Security Team Date: 03/25/2007