閱讀英文

共用方式為


Microsoft Switzerland Security Blog

Security informations brought to you by the Swiss Security Team.

At the Black Hat Security Conference currently taking place in Amsterdam, researchers from the...

Author: Microsoft Swiss Security Team Date: 04/03/2008

The start-up's rootkit detection technology will be added into Microsoft's Windows Live OneCare and...

Author: Microsoft Swiss Security Team Date: 03/29/2008

Spyware authors are offering financial rewards to botnet operators and other cyber-criminals who...

Author: Microsoft Swiss Security Team Date: 03/29/2008

In addition to my previous blog post:...

Author: Microsoft Swiss Security Team Date: 03/29/2008

Apple's teasing commercials that imply its software is safer than Microsoft's may not quite match...

Author: Microsoft Swiss Security Team Date: 03/29/2008

From Roger's blog...

Author: Microsoft Swiss Security Team Date: 03/26/2008

Bruce Schneier: "Uncle Milton Industries has been selling ant farms to children since 1956. Some...

Author: Microsoft Swiss Security Team Date: 03/26/2008

Security researchers are cooking up tactics for beating phishing fraudsters at their own game....

Author: Microsoft Swiss Security Team Date: 03/26/2008

The commercial use of biometrics will become widespread in five years, but is not without security...

Author: Microsoft Swiss Security Team Date: 03/26/2008

Blog Posting from Neil Carpenter: "A number of people are reporting that 10K+ Web sites have been...

Author: Microsoft Swiss Security Team Date: 03/26/2008

If you travel across national borders, it's time to customs-proof your laptop. Customs officials...

Author: Microsoft Swiss Security Team Date: 03/26/2008

New Book: The New School of Information Security by Adam Shostack and Andrew Stewart About the...

Author: Microsoft Swiss Security Team Date: 03/13/2008

Apparently, software updates are getting so big these days that simply downloading them from a...

Author: Microsoft Swiss Security Team Date: 03/13/2008

In this post from the ACE Team, they show how to generate Security Code Review Checklist using...

Author: Microsoft Swiss Security Team Date: 03/12/2008

We just made Internet Explorer 8 Beta 1 available. This could be important if you are developing web...

Author: Microsoft Swiss Security Team Date: 03/12/2008

Microsoft Corp. hopes to beef up online privacy with the acquisition of the U-Prove technology, the...

Author: Microsoft Swiss Security Team Date: 03/12/2008

Cisco has taken a leaf out of Microsoft's book by adopting a regular patch release cycle. However,...

Author: Microsoft Swiss Security Team Date: 03/12/2008

Researchers from a German university have developed a model to predict programming errors in...

Author: Microsoft Swiss Security Team Date: 03/12/2008

At a closed-door security summit hosted on Yahoo’s Sunnyvale campus last week, a researcher...

Author: Microsoft Swiss Security Team Date: 03/12/2008

While some investigations rely on highly trained professionals using expensive tools and complex...

Author: Microsoft Swiss Security Team Date: 03/12/2008

The Anti-Phishing Working Group (APWG) has just released their Phishing Activity Trends Report for...

Author: Microsoft Swiss Security Team Date: 03/12/2008

The rise of PCs, graphical user interfaces, the Internet, and Web 2.0 technologies have obviously...

Author: Microsoft Swiss Security Team Date: 03/10/2008

A majority of government IT organizations say identity management is very important to securing...

Author: Microsoft Swiss Security Team Date: 03/07/2008

"Across the globe, Windows Internet Explorer 7 has more than 100 million users seeing green,"...

Author: Microsoft Swiss Security Team Date: 03/07/2008

Windows XP Service Pack 3 (SP3) includes all previously released updates for the operating system....

Author: Microsoft Swiss Security Team Date: 02/28/2008

The Windows Server 2008 Security Guide provides customers with best practices, predefined security...

Author: Microsoft Swiss Security Team Date: 02/28/2008

Michael Howard on SDL and the need for it; comments onJeff Jones blogs. See SDL blog:...

Author: Microsoft Swiss Security Team Date: 02/27/2008

Last Friday the last of the Windows Server 2008 Security Resource Kit finally went to press! This...

Author: Microsoft Swiss Security Team Date: 02/27/2008

Spammers have found a new trick that gets around many current anti-spam filters: abusing the "out of...

Author: Microsoft Swiss Security Team Date: 02/27/2008

Microsoft's decision last week to let everyone snoop through its software secrets means...

Author: Microsoft Swiss Security Team Date: 02/27/2008

Companies and political organizations should put more effort into registering mis-typed versions of...

Author: Microsoft Swiss Security Team Date: 02/27/2008

Two security researchers at ShmooCon demonstrated on Saturday how a laptop connected to a VoIP...

Author: Microsoft Swiss Security Team Date: 02/27/2008

For the german speaking readers, also a link to my citizenship blog entry: "Kriminelle Energie ist...

Author: Microsoft Swiss Security Team Date: 02/21/2008

A management framework for organizing national cybersecurity efforts:...

Author: Microsoft Swiss Security Team Date: 02/21/2008

SAFECode, the Software Assurance Forum for Excellence in Code, introduced its first white paper,...

Author: Microsoft Swiss Security Team Date: 02/21/2008

Security workers warn that encrypting stored data doesn't truly protect it, and you're fooling...

Author: Microsoft Swiss Security Team Date: 02/21/2008

Have you ever heard about www.security4kids.ch? If not, visiting the site should be one of your...

Author: Microsoft Swiss Security Team Date: 02/21/2008

Microsoft Corporation commissioned West Coast Labs (WCL) to carry out a series of performance...

Author: Microsoft Swiss Security Team Date: 02/14/2008

German cops are pushing ahead with controversial plans, yet to be legally approved, to develop...

Author: Microsoft Swiss Security Team Date: 02/14/2008

U.S. spies are looking increasingly online for intelligence and they've become major consumers of...

Author: Microsoft Swiss Security Team Date: 02/14/2008

European spam networks have pumped out more unsolicited e-mail than those in the U.S. for the third...

Author: Microsoft Swiss Security Team Date: 02/07/2008

Taking a least-privilege approach to user accounts is a key part of any in-depth defense strategy,...

Author: Microsoft Swiss Security Team Date: 02/07/2008

ENISA is presenting the first feasibility study on a European Information Sharing and Alert System...

Author: Microsoft Swiss Security Team Date: 02/07/2008

Teenagers, including children as young as eleven and twelve years old, are increasingly becoming...

Author: Microsoft Swiss Security Team Date: 02/07/2008

If it seems that -- despite your company's best efforts to educate users about security -- users are...

Author: Microsoft Swiss Security Team Date: 02/07/2008

Analysis: Wireless phone headsets of the kind beloved by Wall Street executives and high-end law...

Author: Microsoft Swiss Security Team Date: 02/07/2008

The Forensics Plan Guide defines the basic elements of a Forensic Plan from the first initial...

Author: Microsoft Swiss Security Team Date: 02/04/2008

Microsoft has announced plans to add new anti-exploitation APIs into Windows Vista SP1, Windows XP...

Author: Microsoft Swiss Security Team Date: 02/04/2008

Excerpt of a blog by Jeff Jones: Windows Vista shipped to business customers on the last day of...

Author: Microsoft Swiss Security Team Date: 01/29/2008

<Previous Next>