Compartilhar via


Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Not About Security but Cool – Search based on Silverlight

This has definitely nothing to do with security. But anyway, I thought it worthwhile, to write to...

Author: rhalbheer Date: 08/22/2007

The Effect of Rebooting after an Update

This is interesting: Imagine the scenario where a huge amount of Windows computers all boot at the...

Author: rhalbheer Date: 08/21/2007

Governments and e-Crime

I just read an interesting article BBC News. There seems to be a study by the UK government about...

Author: rhalbheer Date: 08/13/2007

Performance and Reliability Update for Windows Vista

Today we released a Pre-SP1 update for Windows Vista to address some issues we experienced after the...

Author: rhalbheer Date: 08/07/2007

Hackers getting Jobs in the Industry

This is a theme that is quite controversial since a long time: Is it a good idea to hire known...

Author: rhalbheer Date: 08/02/2007

Security not only a Microsoft problem – iPhone finally rooted

It was to be expected – not because Apple built bad security in their iPhone, I am definitely not in...

Author: rhalbheer Date: 07/23/2007

Buy Your Enigma

It is probably the most important and known encryption device ever: The Enigma – the machine that...

Author: rhalbheer Date: 07/20/2007

Stepto becoming a Gamer :-)

If you are working with Microsoft and security you definitely know him – Stephen Toulouse one of the...

Author: rhalbheer Date: 07/17/2007

New Version of the Nigeria Scam

I love that one: Somebody sends e-mails to Hotmail users that their account would expire and they...

Author: rhalbheer Date: 07/17/2007

It’s All the User’s Fault

Isn't it true? Don't we always say that there is a PICNIC problem (Problem in Chair, not in...

Author: rhalbheer Date: 07/17/2007

Only the Easiest Way is the Secure Way

We, being security professionals, are often "just" looking for the most secure way to implement a...

Author: rhalbheer Date: 07/13/2007

How to React on Malware Attacks

Often the Small and Medium Businesses do not have IT resources available and it they have, the...

Author: rhalbheer Date: 07/12/2007

Windows Live OneCare 2.0 Beta available

Looking at my father's PC I always faced the same problem: I wanted to give him a solution that...

Author: rhalbheer Date: 07/12/2007

Malware Portal Live

I blogged about three important announcements we made a few months ago...

Author: rhalbheer Date: 07/10/2007

Vulnerability Auction

I wrote several times already about responsible disclosure and irresponsible disclosure. My point on...

Author: rhalbheer Date: 07/06/2007

6 Month Windows Vista Vulnerability Report

Jeff just posted his next version of the Windows Vista Vulnerability report to his blog. He is now...

Author: rhalbheer Date: 06/21/2007

OEMs: Join in to "Secure by Default"

I recently purchased a PC for my parents and then started to install it – well actually used the OEM...

Author: rhalbheer Date: 06/21/2007

Security Standards Portal

ITU just launched a pretty interesting portal: If you were ever looking for a standard in the...

Author: rhalbheer Date: 06/19/2007

Digital Phishnet Conference 2007

Last week the first Digital Phishnet Conference in Europe took place in Berlin. Basically Digital...

Author: rhalbheer Date: 06/17/2007

Windows Vista Recovery Console and the Password

Every once in a while I am left scratching my head. Over the last few days a few blog postings have...

Author: rhalbheer Date: 06/14/2007

Fake Microsoft Security Bulletin

It happens again: There seems to be a faked message giving users the impression that we are sending...

Author: rhalbheer Date: 06/12/2007

Antiforensics

A pretty interesting article about a guy trying to find a network compromise - he actually did,...

Author: rhalbheer Date: 06/05/2007

Bill's 1987 Prediction on 2007

Actually I did not want to blog about this, but when I read this article, I had to. This is a quote...

Author: rhalbheer Date: 06/04/2007

I recently blogged about three major announcements we made:...

Author: rhalbheer Date: 06/01/2007

Introducing Microsoft Office Isolated Conversion Environment

Over the last few months it became evident: The attacks are moving up the stack. We see less and...

Author: rhalbheer Date: 05/23/2007

Changes to Advanced Notification and Security Bulletins

Over the last few years, often when I met customers I asked them several question: Are you happy...

Author: rhalbheer Date: 05/16/2007

My Visit to Bluehat

This week I am staying on the Campus in Redmond for internal meetings. By accident it happened to me...

Author: rhalbheer Date: 05/09/2007

Analysis of ANI vulnerability

Michael Howard did a very good analysis of the ANI vulnerability and showed what we learned and...

Author: rhalbheer Date: 04/27/2007

Three Microsoft Announcements

Last night Vinny Gullotto made some significant announcements at RSA Japan. At least for us they are...

Author: rhalbheer Date: 04/25/2007

Risks in Online Calendar Sharing

Do you know that scenario: My wife would like to fix a meeting and should have access to my...

Author: rhalbheer Date: 04/25/2007

Yet another UAC discussion

If I would have to nominate the number one feature of Windows Vista, it would be UAC. Not because I...

Author: rhalbheer Date: 04/23/2007

Protecting your disk with biometric devices?

As you (hopefully) know, Windows Vista ships with a component we call Bitlocker - at least some of...

Author: rhalbheer Date: 04/23/2007

Haven't we seen this already? Disgusting!

Remember the days back when Katrina hit New Orleans? The tragedy was still going on and the first...

Author: rhalbheer Date: 04/18/2007

Trustworthy Computing is an Industry Initiative

Remember the early days of Trustworthy Computing? 2002 I started to give keynotes about TwC - as we...

Author: rhalbheer Date: 04/13/2007

Mapping the Malicious Sites on the Web

McAfee SiteAdvisor did an interesting study about the number of malicious sites per domain on the...

Author: rhalbheer Date: 04/13/2007

An E-Mail-Bot Analysis

Well, we all know that we shall not click on links in mails and stuff like that. Marc Russinovich...

Author: rhalbheer Date: 04/10/2007

Spam regarding IE7 installation

We got an increase on helpdesk calls in different subsidiaries with regards to a mail that is...

Author: rhalbheer Date: 03/30/2007

Windows listed as the most secure OS

I read this article today Surprise, Microsoft Listed as Most Secure OS. Hmm, actually I like the...

Author: rhalbheer Date: 03/22/2007

Your Last Line of Defense

Your last line of defense is: Well, the user. In order to help you to address this, we published a...

Author: rhalbheer Date: 03/16/2007

The Race for the first Vista Vulnerability

It is really interesting to see: At the moment there seems to be a big race to find the first real...

Author: rhalbheer Date: 03/15/2007

Paper on the Root DNS Attacks

You remeber for sure the Root DNS Attacks earlier this year, where a DDoS attacked different root...

Author: rhalbheer Date: 03/09/2007

How Secure is Windows Vista

We launched Windows Vista for Businesses End of November and for the public just a little bit more...

Author: rhalbheer Date: 03/09/2007

Distribution of Trojan Horses

Well, we are discussing about Trojan Horses and targeted Trojans all over the place. There is an...

Author: rhalbheer Date: 03/07/2007

Symantec clears Vista on malware

There is a nice article, where Symantec talks about Windows Vista:...

Author: rhalbheer Date: 03/02/2007

Securing your Router Part II

In my last post, I wrote about the risk of not changing the router passwords. Well, if you need one,...

Author: rhalbheer Date: 02/26/2007

How secure is your router?

It is interesting to see, how the threats and problems move over time - but basically the core...

Author: rhalbheer Date: 02/22/2007

<Previous Next>