Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Security informations brought to you by the Swiss Security Team.
New Zlob variant reconfigures routers
A variant of the Zlob virus has emerged that can tweak DNS entries on standard commercial routers...
Author: Microsoft Swiss Security Team Date: 06/25/2008
Microsoft Security Assessment Tool v.3.5 (2008-06)
The Microsoft Security Assessment Tool (MSAT) is a free tool designed to help organizations like...
Author: Microsoft Swiss Security Team Date: 06/23/2008
Microsoft Malware Removal Starter Kit (2008-06)
Many small- and medium-sized organizations use antivirus software, and yet new viruses, worms,...
Author: Microsoft Swiss Security Team Date: 06/23/2008
Are you a computer security professional?
You know you're a computer security professional when: • Although you have no ill intent, you spend...
Author: Microsoft Swiss Security Team Date: 06/13/2008
Covert channel vulnerabilities in anonymity systems
Excerpt: The spread of wide-scale Internet surveillance has spurred interest in anonymity systems...
Author: Microsoft Swiss Security Team Date: 06/13/2008
OECD: Malicious Software (Malware): A Security Threat to the Internet Economy
Excerpt: This report, developed in collaboration with experts, aims to inform policy makers about...
Author: Microsoft Swiss Security Team Date: 06/13/2008
Microsoft Expands Security Information Sharing Program to CERTs
Today at the annual AusCERT Asia Pacific Information Technology Security Conference, Microsoft Corp....
Author: Microsoft Swiss Security Team Date: 05/28/2008
Draft guidance for securing servers (NIST)
The National Institute of Standards and Technology is seeking comment on its draft guidelines for...
Author: Microsoft Swiss Security Team Date: 05/28/2008
Hackers Find a New Place to Hide Rootkits
Security researchers have developed a new type of malicious rootkit software that hides itself in an...
Author: Microsoft Swiss Security Team Date: 05/28/2008
SQL Injection General Guidance
There s a lot of noise arround currently ongoig SQL injection attacks and even if that is quite an...
Author: Microsoft Swiss Security Team Date: 05/28/2008
Windows Server 2008 Remote Server Administration Tools (RSAT)
RSAT is the collection of Windows Server 2008 management tools which enable IT professionals to...
Author: Microsoft Swiss Security Team Date: 05/27/2008
Thoughts of a Teenage Bot Master
One day in May 2005, a 16-year-old hacker named "SoBe" opened his front door to find a swarm of FBI...
Author: Microsoft Swiss Security Team Date: 05/27/2008
Virtual machines aren't really more secure
Roger A. Grimes: "I've been at several recent conferences where virtual machine (VM) and security...
Author: Microsoft Swiss Security Team Date: 05/27/2008
Microsoft is winning the NAC war, expert says
Security guru Joel Snyder from Opus One recently starred as the guest of a live Network World chat...
Author: Microsoft Swiss Security Team Date: 05/27/2008
Microsoft Botnet-hunting Tool Helps Bust Hackers
Botnet fighters have another tool in their arsenal, thanks to Microsoft. Microsoft is giving law...
Author: Microsoft Swiss Security Team Date: 05/27/2008
Windows Server 20008 Active Directory Certificate Services Upgrade and Migration Guide
Active Directory Certificate Services (AD CS) provides customizable services for issuing and...
Author: Microsoft Swiss Security Team Date: 05/26/2008
Managing the Windows Vista Firewall
If you're an IT pro who is looking a bit more seriously at Windows Vista for your enterprise...
Author: Microsoft Swiss Security Team Date: 05/26/2008
Application Lockdown with Software Restriction Policies
When IT professionals look to reduce the total cost of ownership, or TCO, of their desktop machines,...
Author: Microsoft Swiss Security Team Date: 05/26/2008
New Elevation PowerToys for Windows Vista
Run as Administrator for third-party scripting tools Run as Another User Prompt Here as System for...
Author: Microsoft Swiss Security Team Date: 05/26/2008
The Great Debate: Security by Obscurity
Security by obscurity is, in a nutshell, a violation of Kerckhoffs' Principle, which holds that a...
Author: Microsoft Swiss Security Team Date: 05/26/2008
Advances in BitLocker Drive Encryption
What's new in Windows Vista SP1 or Windows Server 2008 Bitlocker?...
Author: Microsoft Swiss Security Team Date: 05/26/2008
Critical infrastructure central to cyber threat
The United States is increasingly vulnerable to cyberattacks that could have catastrophic effects on...
Author: Microsoft Swiss Security Team Date: 05/14/2008
Cyber-Attacks and Cyber-Disasters: Are You Prepared?
Have you seen the recent television commercial that shows the Pentagon and says, "This building gets...
Author: Microsoft Swiss Security Team Date: 05/14/2008
Web 2.0, meet Internet attack 2.0
The glitzy, interactive abilities of Web 2.0 have led to a profusion of new applications, but the...
Author: Microsoft Swiss Security Team Date: 04/30/2008
To defeat a malicious botnet, build a friendly one
Beating the "botnets"–armies of infected computers used to attack websites–requires borrowing...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Modern 'primitive' could ease the pain of encrypting massive amounts of data
Researchers have devised an encryption scheme that could simplify the protection of sensitive...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Researchers find hole in 'flawless' encryption technology
Quantum cryptography, a new technology until now considered 100 per cent secure against attacks on...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Microsoft: We took out Storm botnet
Microsoft Corp. today took credit for crushing the Storm botnet, saying that the malware...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Infosec/Microsoft: Security community must work together
Microsoft has called on companies to work together to improve overall security, and not just rely on...
Author: Microsoft Swiss Security Team Date: 04/30/2008
FBI organizes defense against cyber-attacks
The FBI quietly established last summer a task force involving U.S. intelligence and other agencies...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Shrinking patch windows hit by automated attacks
The length of time between the development of security patches and the development of exploits...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Cyber Criminals Shifting Targets To Mobiles
Mobile networks and handsets are becoming more of a target for criminals with a technical bent,...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Automatic Patch-Based Exploit Generation
Paper Abstract:In this paper, we propose techniques for automatic patch-based exploit generation,...
Author: Microsoft Swiss Security Team Date: 04/30/2008
Security is no match for chocolate and good looking women
A survey out today by the organizers of the tech-security conference Infosecurity Europe found that...
Author: Microsoft Swiss Security Team Date: 04/28/2008
Beta release of Microsoft Windows Live OneCare 2.5
A beta release of Windows Live OneCare 2.5, Microsoft's automated security suite for home users and...
Author: Microsoft Swiss Security Team Date: 04/28/2008
Microsoft Releases Beta of Integrated Security System Forefront “Stirling”
At RSA Conference 2008, Microsoft announced the availability of the public beta release of its...
Author: Microsoft Swiss Security Team Date: 04/11/2008
Microsoft calls for talks on Internet trust, safety
Microsoft today called for broad discussions about the safety of the Internet in an initiative it...
Author: Microsoft Swiss Security Team Date: 04/11/2008
Outsource your code & you're more likely to be hacked
In a new report released by European information technology analysis group, Quocirca, organisations...
Author: Microsoft Swiss Security Team Date: 04/11/2008
Windows Vista SP1 Prerequisite KB937287
Back in February, Microsoft posted about the release of prerequisites for Windows Vista Service Pack...
Author: Microsoft Swiss Security Team Date: 04/10/2008
IC3's 2007 Internet Crime Report
The USA's Internet Crime Complaint Center (IC3) is a partnership between the FBI and the National...
Author: Microsoft Swiss Security Team Date: 04/10/2008
New massive Botnet twice the size of Storm
A new botnet twice the size of Storm has ballooned to an army of over 400,000 bots, including...
Author: Microsoft Swiss Security Team Date: 04/10/2008
The difference between feeling and reality in Security
Security is both a feeling and a reality, and they're different. You can feel secure even though...
Author: Microsoft Swiss Security Team Date: 04/08/2008
Don't blame 'stupid users' for data breaches
Security breaches that can be traced back to the actions of one individual are not the fault of one...
Author: Microsoft Swiss Security Team Date: 04/08/2008
PGP adds encryption to Windows Mobile Smartphones
PGP Corp. has introduced an encryption application that lets enterprise users protect all the data...
Author: Microsoft Swiss Security Team Date: 04/08/2008
Internet Telephony has Security problems
Phone calls that are routed through the Internet instead of telephone wires are increasingly popular...
Author: Microsoft Swiss Security Team Date: 04/08/2008
Hacker group threatens to release Merkel's fingerprints
The Chaos Computer Club (CCC), one of Germany's oldest and largest hacker organisations, threatened...
Author: Microsoft Swiss Security Team Date: 04/03/2008
Interview: Mitnick on avoiding fraudsters
You know that hidden bomb shtick in the movies? There's a bomb that's going to go off and kill a...
Author: Microsoft Swiss Security Team Date: 04/03/2008