Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Not About Security but Cool – Search based on Silverlight
This has definitely nothing to do with security. But anyway, I thought it worthwhile, to write to...
Author: rhalbheer Date: 08/22/2007
The Effect of Rebooting after an Update
This is interesting: Imagine the scenario where a huge amount of Windows computers all boot at the...
Author: rhalbheer Date: 08/21/2007
Governments and e-Crime
I just read an interesting article BBC News. There seems to be a study by the UK government about...
Author: rhalbheer Date: 08/13/2007
Performance and Reliability Update for Windows Vista
Today we released a Pre-SP1 update for Windows Vista to address some issues we experienced after the...
Author: rhalbheer Date: 08/07/2007
Hackers getting Jobs in the Industry
This is a theme that is quite controversial since a long time: Is it a good idea to hire known...
Author: rhalbheer Date: 08/02/2007
Security not only a Microsoft problem – iPhone finally rooted
It was to be expected – not because Apple built bad security in their iPhone, I am definitely not in...
Author: rhalbheer Date: 07/23/2007
Buy Your Enigma
It is probably the most important and known encryption device ever: The Enigma – the machine that...
Author: rhalbheer Date: 07/20/2007
Stepto becoming a Gamer :-)
If you are working with Microsoft and security you definitely know him – Stephen Toulouse one of the...
Author: rhalbheer Date: 07/17/2007
New Version of the Nigeria Scam
I love that one: Somebody sends e-mails to Hotmail users that their account would expire and they...
Author: rhalbheer Date: 07/17/2007
It’s All the User’s Fault
Isn't it true? Don't we always say that there is a PICNIC problem (Problem in Chair, not in...
Author: rhalbheer Date: 07/17/2007
Only the Easiest Way is the Secure Way
We, being security professionals, are often "just" looking for the most secure way to implement a...
Author: rhalbheer Date: 07/13/2007
How to React on Malware Attacks
Often the Small and Medium Businesses do not have IT resources available and it they have, the...
Author: rhalbheer Date: 07/12/2007
Windows Live OneCare 2.0 Beta available
Looking at my father's PC I always faced the same problem: I wanted to give him a solution that...
Author: rhalbheer Date: 07/12/2007
Malware Portal Live
I blogged about three important announcements we made a few months ago...
Author: rhalbheer Date: 07/10/2007
Vulnerability Auction
I wrote several times already about responsible disclosure and irresponsible disclosure. My point on...
Author: rhalbheer Date: 07/06/2007
6 Month Windows Vista Vulnerability Report
Jeff just posted his next version of the Windows Vista Vulnerability report to his blog. He is now...
Author: rhalbheer Date: 06/21/2007
OEMs: Join in to "Secure by Default"
I recently purchased a PC for my parents and then started to install it – well actually used the OEM...
Author: rhalbheer Date: 06/21/2007
Security Standards Portal
ITU just launched a pretty interesting portal: If you were ever looking for a standard in the...
Author: rhalbheer Date: 06/19/2007
Digital Phishnet Conference 2007
Last week the first Digital Phishnet Conference in Europe took place in Berlin. Basically Digital...
Author: rhalbheer Date: 06/17/2007
Windows Vista Recovery Console and the Password
Every once in a while I am left scratching my head. Over the last few days a few blog postings have...
Author: rhalbheer Date: 06/14/2007
Fake Microsoft Security Bulletin
It happens again: There seems to be a faked message giving users the impression that we are sending...
Author: rhalbheer Date: 06/12/2007
Antiforensics
A pretty interesting article about a guy trying to find a network compromise - he actually did,...
Author: rhalbheer Date: 06/05/2007
Bill's 1987 Prediction on 2007
Actually I did not want to blog about this, but when I read this article, I had to. This is a quote...
Author: rhalbheer Date: 06/04/2007
Security Trends on our Malware Portal
I recently blogged about three major announcements we made:...
Author: rhalbheer Date: 06/01/2007
Introducing Microsoft Office Isolated Conversion Environment
Over the last few months it became evident: The attacks are moving up the stack. We see less and...
Author: rhalbheer Date: 05/23/2007
Changes to Advanced Notification and Security Bulletins
Over the last few years, often when I met customers I asked them several question: Are you happy...
Author: rhalbheer Date: 05/16/2007
My Visit to Bluehat
This week I am staying on the Campus in Redmond for internal meetings. By accident it happened to me...
Author: rhalbheer Date: 05/09/2007
Analysis of ANI vulnerability
Michael Howard did a very good analysis of the ANI vulnerability and showed what we learned and...
Author: rhalbheer Date: 04/27/2007
Three Microsoft Announcements
Last night Vinny Gullotto made some significant announcements at RSA Japan. At least for us they are...
Author: rhalbheer Date: 04/25/2007
Risks in Online Calendar Sharing
Do you know that scenario: My wife would like to fix a meeting and should have access to my...
Author: rhalbheer Date: 04/25/2007
Yet another UAC discussion
If I would have to nominate the number one feature of Windows Vista, it would be UAC. Not because I...
Author: rhalbheer Date: 04/23/2007
Protecting your disk with biometric devices?
As you (hopefully) know, Windows Vista ships with a component we call Bitlocker - at least some of...
Author: rhalbheer Date: 04/23/2007
Haven't we seen this already? Disgusting!
Remember the days back when Katrina hit New Orleans? The tragedy was still going on and the first...
Author: rhalbheer Date: 04/18/2007
Trustworthy Computing is an Industry Initiative
Remember the early days of Trustworthy Computing? 2002 I started to give keynotes about TwC - as we...
Author: rhalbheer Date: 04/13/2007
Mapping the Malicious Sites on the Web
McAfee SiteAdvisor did an interesting study about the number of malicious sites per domain on the...
Author: rhalbheer Date: 04/13/2007
An E-Mail-Bot Analysis
Well, we all know that we shall not click on links in mails and stuff like that. Marc Russinovich...
Author: rhalbheer Date: 04/10/2007
Spam regarding IE7 installation
We got an increase on helpdesk calls in different subsidiaries with regards to a mail that is...
Author: rhalbheer Date: 03/30/2007
Windows listed as the most secure OS
I read this article today Surprise, Microsoft Listed as Most Secure OS. Hmm, actually I like the...
Author: rhalbheer Date: 03/22/2007
Your Last Line of Defense
Your last line of defense is: Well, the user. In order to help you to address this, we published a...
Author: rhalbheer Date: 03/16/2007
The Race for the first Vista Vulnerability
It is really interesting to see: At the moment there seems to be a big race to find the first real...
Author: rhalbheer Date: 03/15/2007
Paper on the Root DNS Attacks
You remeber for sure the Root DNS Attacks earlier this year, where a DDoS attacked different root...
Author: rhalbheer Date: 03/09/2007
How Secure is Windows Vista
We launched Windows Vista for Businesses End of November and for the public just a little bit more...
Author: rhalbheer Date: 03/09/2007
Distribution of Trojan Horses
Well, we are discussing about Trojan Horses and targeted Trojans all over the place. There is an...
Author: rhalbheer Date: 03/07/2007
Symantec clears Vista on malware
There is a nice article, where Symantec talks about Windows Vista:...
Author: rhalbheer Date: 03/02/2007
Securing your Router Part II
In my last post, I wrote about the risk of not changing the router passwords. Well, if you need one,...
Author: rhalbheer Date: 02/26/2007
How secure is your router?
It is interesting to see, how the threats and problems move over time - but basically the core...
Author: rhalbheer Date: 02/22/2007