1 Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and potentially unwanted software, software exploits, security breaches and software vulnerabilities (both in Microsoft software and in third-party software). Microsoft developed these perspectives based on detailed analysis over the past several years, with a focus on the first half of 2009 (1H09) 1. This document is a summary of the key findings of the report. The full Security Intelligence Report also offers strategies, mitigations, and countermeasures and can be downloaded from Malicious and Potentially Unwanted Software Geographic Trends Microsoft security products gather, with user consent, data from hundreds of millions of computers worldwide and from some of the Internet s busiest online services. Analysis of this data gives a comprehensive and unique perspective on malware and potentially unwanted software activity around the world. Figure 1. Infection rates by country/region, 1H09, expressed in CCM 2 1 The nomenclature used throughout the report to refer to different reporting periods is nhyy, where nh refers to either the first (1) or second (2) half of the year, and YY denotes the year. For example, 1H09 represents the period covering the first half of 2009 (January 1 through June 30), while 2H08 represents the period covering the second half of 2008 (July 1 through December 31). 2 Infection rates in this report are expressed using a metric called Computers Cleaned per Mil (CCM) that represents the number of computers cleaned per thousand executions of the MSRT.
2 In the United States, the United Kingdom, France and Italy trojans were the largest single category of threat; in China, several language-specific browser-based threats were prevalent; in Brazil, malware targeting online banking was widespread; in Spain and Korea, worms dominated, led by threats targeting online gamers. Indepth descriptions of the threats found in 18 countries are available in the full version of the Security Intelligence Report. Figure 2. Threat categories worldwide and in the eight locations with the most computers cleaned, by incidence among all computers cleaned, 1H09 Operating System Trends Different Microsoft Windows operating system versions show differing rates of infection due to the different features and service packs that are available for each, and differences in the way people and organizations use each version (note that the infection rate for each version of Windows is calculated separately; the infection rate for a version is not affected by the number of computers running it). Figure 3. Number of computers cleaned for every 1,000 MSRT executions, by operating system, 1H09
3 Infection rates for Windows Vista were significantly lower than Windows XP in all configurations in 1H09. The infection rate of Windows Vista SP1 was 61.9 % less than Windows XP SP3. 3 Comparing RTM versions, the infection rate of Windows Vista was 85.3 % less than Windows XP. The infection rate of Windows Server 2008 RTM was 52.6 % less than Windows Server 2003 SP2. The higher the service pack level, the lower the rate of infection: Service packs include all previously released security updates at the time of issue. They can also include additional security features, mitigations, or changes to default settings to protect users. Users who install service packs may generally maintain their computers better than users who do not install service packs and may also be more cautious in the way they browse the Internet, open attachments, and engage in other activities that can open computers to attack. Server versions of Windows typically display a lower infection rate on average than client versions. Servers tend to have a lower effective attack surface than computers running client operating systems because they are more likely to be used under controlled conditions by trained administrators and to be protected by one or more layers of security. The figure below shows the consistency of these trends over time, showing infection rates for different versions of the 32-bit editions of Windows XP and Windows Vista for each six-month period between 1H07 and 1H09. Figure 4. CCM trends for 32-bit versions of Windows Vista and Windows XP, 1H07-1H09 3 Windows Vista Service Pack 2 was released on June 30, the last day of 1H09, and is therefore not included in this analysis.
4 The Threat Landscape at Home and in the Enterprise Computers in enterprise environments (those running Forefront Client Security) were much more likely to encounter worms during 1H09 than home computers running Windows Live OneCare. The top threat detected in enterprise environments was the Conficker worm; however, Conficker was not in the top ten threats detected in home environments. Figure 5. Threat categories removed by Windows Live OneCare and Forefront Client Security in 1H09, by percentage of all infected computers cleaned by each program Worldwide Category Trends Miscellaneous Trojans (including rogue security software) remained the most prevalent category. Worms rose from 5th place in 2H08 to become the second most prevalent category in 1H09. The prevalence of Password Stealers & Monitoring Tools also rose, due in part to increases in malware targeting online gamers. Figure 6. Computers cleaned by threat category, in percentages, 2H06 1H09
5 Analysis of Malware Hosts The SmartScreen Filter, introduced in Internet Explorer 8, provides phishing and anti-malware protection. The figure below details patterns of malware distribution detected by the SmartScreen Filter in 1H09. The Miscellaneous Potentially Unwanted Software category increased from 35.0 % of malware impressions in 2H08 to 44.5 % in 1H09, while the percentage of computers cleaned declined from 22.8 percent to 14.9 percent for the category. This suggests that SmartScreen and similar technologies may be successfully intercepting these threats before they are downloaded to computers. Miscellaneous Potentially Unwanted Software is disproportionally likely to be distributed over the Web - by contrast, worms are rarely distributed by malicious Web sites, accounting for just 1.2 percent of SmartScreen impressions, compared to 21.3 percent of computers cleaned. Figure 7. Threats hosted at URLs blocked by the SmartScreen Filter, by category Geographic Distribution of Malware Hosting Sites More malware distribution sites are discovered on a daily basis than phishing sites Malware hosting tends to be more stable and less geographically diverse. o This is probably due to the relatively recent use of server takedowns and Web reputation as weapons in the fight against malware distribution, which means that malware distributors have not been forced to diversify their hosting arrangements, as phishers have.
6 Figure 8. Malware distribution sites per 1,000 Internet hosts for locations around the world in 1H09 Analysis of Phishing Sites Phishing impressions rose significantly in 1H09, due primarily to a large increase in phishing attacks targeting social networking sites. Phishers continued to target a wider range of Web-site types than in the past, with gaming sites, portals, and the online presences of major corporations being some of the most frequently-targeted sites in 1H09. After remaining mostly consistent throughout 2H08 and through April of 2009, the number of impressions suddenly nearly quadrupled in May, and rose even higher in June due in part to a campaign or campaigns targeting social networks. More information on these trends can be found in the full Security Intelligence Report. Figure 9. Phishing impressions tracked each month in 2H08 and 1H09, indexed to January 2009
7 Institutions Financial institutions, social networks and e-commerce sites remain favored targets for phishing attempts. Researchers also observed some diversification into other types of institutions, such as online gaming sites, Web portals, and large software and telecommunications companies. Figure 10. Impressions for each type of phishing site each month in 1H09 Geographic Distribution of Phishing Sites Phishing sites are hosted all over the world on free hosting sites, on compromised Web servers, and in numerous other contexts; performing geographic lookups on the IP addresses of the sites makes it possible to create maps showing the geographic distribution of sites and to analyze patterns. Figure 11. Phishing sites per 1,000 Internet hosts for locations around the world in 1H09
8 Threats Forefront Online Protection for Exchange (FOPE) blocked 97.3% of all messages received at the network edge in 1H09, up from 92.2% in 2H08. In total, FOPE blocked more than 98% of all messages received. Spam in 1H09 was dominated by product advertisements, primarily pharmaceutical products. In total, product advertisements accounted for 69.2 % of spam in 2H08. The figure below shows the countries and regions around the world that originated the most spam, as detected by FOPE from March through June, A full list of countries and the number of spam messages originating from them can be found in the full Security Intelligence Report. Figure 12. Inbound messages blocked by FOPE content filters in 1H09, by category Figure 13. Geographic origins of spam in 1H09, by percentage of total spam sent Automated SQL Injection Attacks SQL injection is a technique used by attackers to damage or steal data residing in databases that use Structured Query Language (SQL) syntax to control information storage and retrieval. Use of this technique was widely observed during 1H09. SQL injection usually involves directly passing malicious SQL code to a program or script that queries a database. If the program or script does not properly validate the input, the attacker may be able to execute arbitrary commands. Beginning in late 2007 attackers began to use automated tools to compromise large numbers of Web sites through SQL injection, in an attempt to spread malware. Web applications often construct pages dynamically as they are requested, by retrieving information from a database and using it to populate the page.
9 Figure 14. How a mass SQL injection tool works More details on SQL injection techniques and guidance on how to protect against them can be found in the Security Intelligence Report. Exploit Trends - Browser-Based Exploits To assess the relative prevalence of browser-based exploits in 1H09, Microsoft analyzed a sample of data from customer-reported incidents, submissions of malicious code, and Microsoft Windows error reports. The data encompasses multiple operating systems and browser versions, from Windows XP to Windows Vista. It also includes data from third-party browsers that host the Internet Explorer rendering engine, called Trident. 4 For browser-based attacks on Windows XP based machines, Microsoft vulnerabilities accounted for 56.4% of the total. On Windows Vista based machines, Microsoft vulnerabilities accounted for just 15.5% of the total. 4 See for more information on Trident.
10 Figure 15. Browser-based exploits targeting Microsoft and third-party software on computers running Windows XP, 1H09 Figure 16. Browser-based exploits targeting Microsoft and third-party software on computers running Windows Vista, 1H09 Microsoft software accounted for 6 of the top 10 browser-based vulnerabilities attacked on computers running Windows XP in 1H09, compared to only 1 on computers running Windows Vista. The vulnerabilities are referenced below by the relevant CVSS bulletin number or by Microsoft Security Bulletin number as appropriate. Figure 17. Top 10 browser-based vulnerabilities exploited on computers running Windows XP, 1H09 Microsoft Vulnerabilities Third Party Vulnerabilities
11 Figure 18. Top 10 browser-based vulnerabilities exploited on computers running Windows Vista, 1H09 Microsoft Office Format Files The most frequently-exploited vulnerabilities in Microsoft Office software during 1H09 were also some of the oldest. More than half of the vulnerabilities exploited were first identified and addressed by Microsoft security updates in % of the attacks exploited a single vulnerability for which a security update (MS06-027) had been available for three years. Computers which had this update applied were protected from all these attacks. Figure 19. Microsoft Office file format exploits encountered in 1H09, by percentage The figure below shows the total attacks observed in the sample set against Microsoft Windows and Microsoft Office during 1H09. The horizontal axis shows the last date that the computers in the sample set were updated with security updates for Windows and Office.
12 The majority of Office attacks observed in 1H09 (55.5 percent) affected Office program installations that had last been updated between July 2003 and June Most of these attacks affected Office 2003 users who had not applied a single service pack or other security update since the original release of Office 2003 in October By contrast, the computers in the sample set were significantly more likely to have had recent Windows security updated applied. Users who do not keep both their Office program installations and Windows operating systems up to date with service packs and security updates are at increased risk of attack. Microsoft recommends that computers are configured to use Microsoft Update to keep Windows operating systems and other Microsoft software updated. Figure 20. Microsoft Office file format exploits encountered in 1H09, by date of last Windows or Office security update Analysis of Drive-by Download Pages The majority of drive-by download pages are hosted on compromised legitimate Web sites. Attackers gain access to legitimate sites through intrusion, or by posting malicious code to a poorly secured Web form, like a comment field on a blog. Compromised servers acting as exploit servers can have massive reach; one exploit server can be responsible for hundreds of thousands of infected web pages. Exploit servers in 2009 were able to infect many thousands of pages in a short period of time.
13 Figure 21. Types of threat payloads delivered through drive-by downloads in 1H09 The Trojan Downloaders & Droppers category was the most frequently-encountered category among drive-by download sites, with 40.7 % of the total. Trojan downloaders are well suited for delivery by driveby download because they can be used to install other threats on infected computers. Industry-Wide Vulnerability Disclosures Vulnerabilities are weaknesses in software that allow an attacker to compromise the integrity, availability, or confidentiality of that software. Some of the worst vulnerabilities allow attackers to run arbitrary code on a compromised computer. Data in this section comes from third-party sources, published reports, and Microsoft s own data. Total unique vulnerability disclosures across the industry decreased sharply in 1H09, down 28.4% from 2H08. While application vulnerabilities are down from 2H08, operating system vulnerabilities are roughly consistent with the previous period, and browser vulnerabilities actually increased slightly. Figure 22. Industry-wide operating system, browser, and other vulnerabilities, 1H04-1H09
14 Vulnerabilities rated as High severity by the Common Vulnerability Scoring System (CVSS) 5 decreased 12.9% from 2H08; 46.0% of all vulnerabilities were rated as High severity. As with severity, the complexity trend in 1H09 is a generally positive one % of all vulnerabilities were Low complexity in 1H09, down from 57.7 % in 2H08, and down almost 30 percentage points over the last five years. Figure 23. Industry-wide vulnerability disclosures by severity, 1H04-1H09 Figure 24: Industry-wide vulnerability disclosures by complexity, 1H04-1H09 Microsoft vulnerability disclosures have mirrored those for the industry as a whole, though on a much smaller scale. Over the past five years, Microsoft vulnerability disclosures have consistently accounted for about 3 6 % of all disclosures industry-wide. Figure 25. Vulnerability disclosures for Microsoft and non-microsoft products, 1H04-1H09 5 CVSS is an industry standard for assessing the severity of software vulnerabilities. See for more documentation and details.
15 Microsoft Vulnerability Details for 1H09 In 1H09 Microsoft released 27 security bulletins, which addressed 85 individual CVE-identified vulnerabilities. Figure 26. Security Bulletins released and CVEs addressed by half-year, 1H05-1H09 Responsible disclosure means disclosing vulnerabilities privately to an affected vendor so it can develop a comprehensive security update to address the vulnerability before the details become public knowledge. This helps to keep users safer by preventing potential attackers from learning about newly discovered vulnerabilities before security updates are available. In 1H09, 79.5 % of vulnerabilities disclosed in Microsoft software adhered to responsible disclosure practices, up from 70.6 % in 2H08. Figure 27. Responsible disclosures as a percentage of all disclosures involving Microsoft software, 1H05-1H09
16 Exploitability Index 41 vulnerabilities were assigned an Exploitability Index Rating of 1, meaning that they were considered the most likely to be exploited within 30 days of the associated security bulletin s release. Microsoft observed eleven of these vulnerabilities being exploited in the first 30 days. Of the 46 vulnerabilities that received Exploitability Index ratings of 2 or 3, indicating that exploitation would be unreliable or unlikely, none were identified to have been publicly exploited within 30 days. Figure 28. CVEs with exploits discovered within 30 days in 1H09, by Exploitability Index rating Usage Trends for Windows Update and Microsoft Update The prompt adoption of security updates and other software upgrades can significantly mitigate the spread and impact of malware. Microsoft recommends that computers are configured to use Microsoft Update to keep Windows operating systems and other Microsoft software updated. o Windows Update provides updates for Windows components, for device drivers provided by Microsoft and other hardware vendors and also distributes signature updates for Microsoft antimalware products, and the monthly release of the MSRT. o Microsoft Update provides all of the updates offered through Windows Update, and also provides updates for other Microsoft software, such as the Microsoft Office system. Microsoft Update adoption has risen significantly over the past several years, with increasing numbers of Windows Update users choosing to switch to the more comprehensive service. Figure 29. Usage of Windows Update and Microsoft Update, 2H06-1H09, indexed to 2H06 total usage
17 The Role of Automatic Updating Automatic updating is one of the most effective tools that users and organizations can utilize to help prevent the spread of malware. For example, in February 2007 the trojan downloader family Win32/Renos began infecting computers around the world. On February 27, Microsoft released a signature update for Windows Defender via Windows Update and Microsoft Update. Within three days, enough computers had received the new signature update to reduce the error reports from 1.2 million per day to less than 100,000 per day worldwide. Figure 30. Windows error reports caused by Win32/Renos on Windows Vista, February - March 2007 Regional Variations in Update Service Usage Use of Microsoft online update services varies worldwide due to a number of factors, including broadband Internet connectivity, software piracy, and the percentage of computers managed in enterprise environments. The incidence of software piracy in a location tends to be strongly negatively correlated with usage of Windows Update and Microsoft Update. The figure below uses update service usage and software piracy rates in the United States to establish a baseline (shown as 100%) for each trend; other countries are displayed relative to the United States.
18 Figure 31. Update service usage and software piracy rates for seven locations worldwide, relative to the United States Security Breach Trends This section examines security breach incidents from around the world with data provided by Open Security Foundation s OSF Data Loss Database at The top category reported for data loss through a security breach in 1H09 continued to be stolen equipment, such as laptop computers (30.0% of all data-loss incidents reported), accounting for twice as many incidents as intrusion. Security breaches from hacking or malware incidents remain less than 15.0% of the total. Figure 32. Security breach incidents, 2H07-1H09, by incident type ;
19 Help Microsoft improve the Security Intelligence Report Thank you for taking the time to read the latest volume of the Microsoft Security Intelligence Report. We want to ensure that this report remains as usable and relevant as possible for our customers. If you have any feedback on this volume of the report, or if you have suggestions about how we can improve future volumes, please let us know by sending an message to Thanks and best regards, Microsoft Trustworthy Computing This summary is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS SUMMARY. No part of this summary may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this summary. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this summary does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Copyright 2009 Microsoft Corporation. All rights reserved. Microsoft, the Microsoft logo, Windows, Windows XP, Windows Vista, Bing and Microsoft Office are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Microsoft Security Intelligence Report Volume 16 July through December, 2013 Key Findings Summary This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY,
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Ziv Mador Senior Program Manager and Response Coordinator Jeff Williams Principal Group Manager Microsoft Malware Protection Center Trend of Malware and Potentially Unwanted Software becoming more regional
Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce Content The recent flurry of media coverage around identity theft and what is being called the new scam of phishing, in which online
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
Introduction As the number of users working from outside of the enterprise perimeter increases, the need for more efficient methods of securing the corporate network grows exponentially. In Part 1 of this
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case
Meng-Chow Kang, CISSP, CISA (ISC) 2 Asia Advisory Board Chief Security Advisor Microsoft Greater China Region Vulnerability Disclosure, Malware, and Potentially Unwanted Software Information challenges
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection
ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus
ESET NOD32 ANTIVIRUS 7 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus
DECLARATIONS WARRANTIES Although the best efforts are made to ensure that the information in this document is complete and correct, MICROS Systems, Inc. makes no warranty of any kind with regard to this
ESET SMART SECURITY 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET Smart Security
Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation
2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by
ESET SMART SECURITY 7 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET Smart Security
Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account
System Requirements for Microsoft Dynamics NAV 2013 R2 February 2014 Contents 3 System Requirements for the Microsoft Dynamics NAV Windows Client 3 Web Client 4 System Requirements for Microsoft Dynamics
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
Understanding Anti-Malware Research and Response at Microsoft An introduction to the Malware Protection Center Understanding Anti-Malware Research and Response at Microsoft An introduction to the Microsoft
Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
ANALYST BRIEF Evolutions in Browser Security TRENDS IN BROWSER SECURITY PERFORMANCE Author Randy Abrams Overview This analyst brief aggregates results from NSS Labs tests conducted between 2009 and 2013
Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
Survey: Endpoint Security Concerns 2014 The issues keeping IT admins awake into the New Year Intro 2014 has created uncertainty for those in charge of IT security. Not only is the threat landscape advancing
y Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by Phone: +1 877-21-TREND www.trendmicro.com/go/smartprotection
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
B e s t P r a c t i c e s G u i d e It s a fact of business today: because of the economy, most organizations are asking everyone, including the IT staff, to do more with less. But tight budgets and the
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
Privacy in the Cloud Computing Era A Microsoft Perspective November 2009 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Microsoft Corporation Published: December 2010 Microsoft Dynamics is a line of integrated, adaptable business management
Kevin Dean Technology Strategist Education Southeast Microsoft Corporation Security Exploits History The Threat landscape today Microsoft Security Development Lifecycle State of Security today Trends in
Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received by the (APWG) came to 23,61 in, a drop of over 6, from January s previous record
Internet Security Threat Report Volume XII B-Security(1) Internet Security Threat Report XII Important Facts Data Sources Symantec Global Intelligence Network 40,000 registered sensors in 180 countries.
Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
Microsoft Security Incident Response Roberto Arbeláez Security Program Manager for LATAM Microsoft Corporation firstname.lastname@example.org Agenda Microsoft Security Stakeholders Threat Landscape Security
Windows Vista: Is it secure enough for business? Five years after the release of Windows XP, Microsoft s primary stated goal with Windows Vista has been to reduce security vulnerabilities and overall susceptibility
Product Guide for Windows Home Server Microsoft Corporation Published: January, 2009 Version: 1.1 This his Product Guide provides an overview of the features and functionality of Windows Home Server software.
Seven for 7: Best practices for implementing Windows 7 The early reports are in, and it s clear that Microsoft s Windows 7 is off to a fast start thanks in part to Microsoft s liberal Windows 7 beta program
Commissioned Study SURVEY: Web Threats Expose Businesses to Data Loss Introduction Web-borne attacks are on the rise as cybercriminals and others who do harm to computer systems for profit or malice prey
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
Enterprise Security Solutions by Quick Heal Seqrite Essential enterprise security for every connected endpoint SME Edition Product Highlights A must-have endpoint security solution that provides the best
Windows Small Business Server 2003 Upgrade Best Practices Microsoft Corporation Published: May 2005 Version: 1 Abstract To ensure a successful upgrade from the Microsoft Windows Small Business Server 2003
Business Products Testing Report Performed by AV-Test GmbH January 2011 1 Business Products Testing Report - Performed by AV-Test GmbH Executive Summary Overview During November 2010, AV-Test performed
Case Study for XY Bank Real-time desktop security monitoring and integration with ArcSight 1 Table of Contents Introduction... 3 Customer IT Environment... 3 Issues, Challenges & Objectives... 3 Nexthink
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
Security for a Smarter Planet The Smarter Planet Our world is getting Instrumented Our world is getting Interconnected Our world is getting Intelligent Growing Security Challenges on the Smarter Planet
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Microsoft Update Management Sam Youness Microsoft Microsoft s Areas of Focus for ICS Risk Management Secure Development Device and Network Security Identity and Access Management Operational Response Get
Best Practices Top 10: Keep your e-marketing safe from threats Months of work on a marketing campaign can go down the drain in a matter of minutes thanks to an unforeseen vulnerability on your campaign
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
The risks borne by one are shared by all: web site compromises Having your company web site hacked or compromised can be a costly experience for your organisation. There are immediate costs in responding
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work
Microsoft Security Intelligence Report Volume 13 Tim Rains Director, Trustworthy Computing, Microsoft Jeff Jones Director, Trustworthy Computing, Microsoft Session ID: DSP-R33 Session Classification: Intermediate
Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4
FortiGuard Global Security Research & Services www.fortinet.com Fortinet s Own Threat Intelligence & Response for Real-Time Protection Fortinet is the only network security vendor to have its own global
SecurityMetrics Vision whitepaper 1 SecurityMetrics Vision: Network Threat Sensor for Small Businesses Small Businesses at Risk for Data Theft Small businesses are the primary target for card data theft,
Your consent to our cookies if you continue to use this website.