Skip to main content
Microsoft Security

Microsoft Security Blog

Understanding type confusion vulnerabilities: CVE-2015-0336 

In March 2014, we observed a patched Adobe Flash vulnerability (CVE-2015-0336) being exploited in the wild. Adobe released the patch on March 12, 2014, and exploit code using this vulnerability first appeared about a week later. To help stay protected: Keep your Microsoft security software, such as Windows Defender for Windows 8.1 up-to-date. Keep your […]

Published
1 minute read

Latest data shows newer versions of Windows have lower malware infection rates than older versions 

We released the latest volume of the Microsoft Security Intelligence Report last week. The latest data on how different versions of the Windows operating system are mitigating modern malware attacks suggests that newer versions are performing better than older versions. The figure below illustrates the malware infection rates for Windows client and server operating systems […]

Published
1 minute read

Latest Microsoft Security Intelligence Report Now Available 

Volume 18 of the Microsoft Security Intelligence Report (SIR) is now available at http://microsoft.com/sir. This volume of the SIR focuses on the second half of 2014 and contains longer term trend data as well. SIR volume 18 contains data, insights and practical guidance on a range of global and regional cybersecurity threats including vulnerability disclosures, […]

Published
2 min read

Cleaning up misleading advertisements 

Protecting the modern workplace from a wide range of undesirable software Our evaluation criteria describe the characteristics and behavior of malware and potentially unwanted applications and guide the proper identification of threats. Learn how we classify malicious software, unwanted software, and potentially unwanted applications. Read the blog post. Microsoft is committed to protecting our customers […]

Retain Microsoft Security Experts

Microsoft Security Experts are now available to strengthen your team with managed security services. Learn how to defend against threats with security experts.

Published
1 minute read

ABB Automation & Power World 2015 – Cybersecurity in the evolving threat landscape 

In early March, I had the fortunate opportunity to speak at the ABB Automation & Power World 2015 conference in Houston, TX. This event is like a “Disneyland” for critical infrastructure providers (CIPs)! This was my first time attending the bi-annual event and I was blown away by the innovative power and automation technologies that […]

Published
1 minute read

Microsoft achieves globally recognized ISO/IEC 27018 privacy standard 

Today Microsoft announced its continued commitment to further protect customers’ privacy by obtaining the globally recognized ISO/IEC 27018 privacy standard for Microsoft Azure, Office 365, and Dynamics CRM Online. This achievement is designed to help assure customers of all sizes, that their most sensitive personal data will receive the strong privacy protections detailed in this […]

SCharney6 012815

The Importance of Effective Information Sharing 

This week, I testified before the U.S. Senate Committee on Homeland Security and Governmental Affairs at a hearing on “Protecting America from Cyber Attacks: the Importance of Information Sharing.” It was good to see that the committee’s first hearing of the 114th Congress focuses on cybersecurity issues generally, and information sharing in particular, and I’d like […]

Information Sharing Infographic

Putting Information Sharing into Context 

Putting Information Sharing into Context: New Whitepaper Offers Framework for Risk Reduction The nearly incessant drumbeat of cybersecurity incidents over the past weeks and months has brought about renewed interested in information sharing across the technical and political spheres. For example, earlier this month the White House proposed legislation to encourage information sharing which President […]

MAPS_
Published
3 min read

MAPS in the cloud: How can it help your enterprise? 

(Note: Microsoft Active Protection Service is now called Windows Defender Antivirus cloud protection service. Read about it in this blog entry: Windows Defender Antivirus cloud protection service: Advanced real-time defense against never-before-seen malware.) Malware can easily send a huge enterprise infrastructure into a tailspin. However, you can get greater protection from malware by using services […]

Published
3 min read

Your Browser is (not) Locked 

Most ransomware has a binary file that needs to be executed before it can infect your PC. Ransomware usually relies on social engineering or exploits to infect unsuspecting users. However, some malware authors are bypassing this requirement with a new trick – browser lockers. Unlike traditional ransomware threats that lock the entire desktop, browser lockers […]

7 Precautions for Protecting Against Perpetrators 

Cyberattacks and data breaches continue to dominate the news globally. The reality is that most organizations face the same often reported threats and are carrying on their work towards counteracting those risks. Some organizations victimized by cybercriminals have shared information publicly. Others have chosen to conduct investigations and share information about the attack in a […]