Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Microsoft Security Newsletter - March 2013

$
0
0
Microsoft Security Newsletter - March 2013

Trustworthy Computing | March 2013
Microsoft Security Newsletter

Welcome to March’s Security Newsletter!

This month’s newsletter focuses on the importance of end user education in a successful security strategy. Employees that lack awareness of potential threats can put organizations at greater risk without realizing it. When attackers successfully compromise individual systems within an organization, it has the potential to expose an organization’s entire network. This is why continuous employee education can be key to helping protect against cybercrime.



Attackers often target employees using social engineering attacks. One of the most popular deception tactics cybercriminals use today is to trick users into installing fake antivirus software, commonly known as “rogue security software” or “scareware.” This tactic has successfully compromised millions of systems over the years and is one of the reasons we developed the “
https://www.facebook.com/msftmmpc/app_236330836495399
Real vs. Rogue ” challenge. The Real vs. Rogue challenge is an interactive quiz that uses images of actual rogue security software to test whether you can tell the difference between legitimate antivirus software and rogue security software. Together with the
http://www.microsoft.com/security/resources/videos.aspx
how-to videos  we have published on rogue security software, viruses, spam, and other threats, this challenge is a great resource for organizations looking to educate their users on the common security pitfalls found on the Internet today.



Another security risk organizations commonly face today is software piracy. According to a
http://www.microsoft.com/en-us/news/download/presskits/antipiracy/docs/IDC030513.pdf
study released by IDC  earlier this month, approximately one third of PC software in the world is counterfeit. The study showed that one in three enterprise PCs with counterfeit software installed will be infected with malware in 2013 and that enterprises will collectively spend USD $114 billion dealing with security issues caused by pirated software. Given this information, it is super important for organizations to educate employees on the risks of using software that is not genuine.When purchasing or downloading software, both decision makers and users alike should ask questions, investigate packaging that doesn’t look quite right, watch for “too good to be true” prices, and always demand genuine software when purchasing a computer. My mantra is “if you don’t trust the source of the software, don’t trust the software.” Visit
http://www.howtotell.com/
www.howtotell.com  to learn more about how to avoid purchasing fake software.



Of course these are just a few of the resources Microsoft provides for organizations to help educate employees. You can find many more great educational resources by visiting
http://www.microsoft.com/security
www.microsoft.com/security .



Best regards,

Tim Rains, Director

Microsoft
Trustworthy
Computing


Top Stories

http://blogs.technet.com/b/microsoft_blog/archive/2013/02/26/a-case-for-security-optimism.aspx

Making the Case for Security Optimism

In the midst of sometimes provocative headlines, the tangible progress being made to advance the industry is often overlooked. Explore the key security industry accomplishments and government activities that will have long-term impact in this blog post from Trustworthy Computing Corporate Vice President Scott Charney.


http://blogs.technet.com/b/security/archive/2013/02/25/microsoft-offers-security-assessment-service-for-country-code-top-level-domain-registries-cctld.aspx

Microsoft Offers Security Assessment Service for Country-Code Top-Level Domain Registries (ccTLD)

The exploitation of vulnerabilities specific to country-code top-level domain (ccTLD) registries has become an increasingly common problem, especially in relatively small markets around the world. Attacks on ccTLDs have far-reaching effects on private individuals, large and small companies, non-profits, and government organizations. Learn about the new
http://www.microsoft.com/cctldregsec
Microsoft ccTLD Registry Security Assessment  service, which offers free assistance to registry operators to find and fix security vulnerabilities before they are exploited.


http://blogs.technet.com/b/mmpc/archive/2013/03/14/ramnit-the-renewed-bot-in-town.aspx

Ramnit: The Renewed Bot in Town

Ramnit is one of the most prevalent threat families still active in the wild today. In the latter half of 2012, a newer version of Ramnit emerged which stripped off all of its infection function routine, but enhanced its botnet function heavily. Explore some of Ramnit’s more notable techniques and learn how to avoid infection.



Security Guidance

http://technet.microsoft.com/windows/jj983729.aspx?ocid=wc-nl-secnews

Security Tip of the Month: Try It Out – BitLocker: Encrypt Used Space Only

When you encrypt a drive with Windows Vista or Windows 7, BitLocker encrypts every bit of space on the drive, even if it’s not in use. Windows 8 introduces Used Disk Space Only encryption, which gives you the option to encrypt only space on the drive that is actively being used. Learn how to quickly encrypt used space only with this quick guide.


http://www.microsoft.com/security/resources/work.aspx

Internet Security at Work Toolkit

Lost or stolen information can expose company secrets, disclose customer data, or reveal confidential employee information. But safeguarding your company’s information also depends on the commitment, cooperation, and Internet security know-how of every computer user in the organization. This toolkit offers resources that can help you teach your employees how to work more securely on the Internet and better defend your company’s information (including customer data) and financial assets against online fraud and other cybercrimes.


http://windows.microsoft.com/en-us/windows-8/security

Windows 8 Security Tips

Share this series of short tips with users to help them learn how to
http://windows.microsoft.com/en-us/windows-8/privacy-on-public-networks
stay private on public networks ,

http://windows.microsoft.com/en-us/windows-8/secure-microsoft-account

add security information to their Microsoft accounts ,

http://windows.microsoft.com/en-us/windows-8/shared-help-protect-yourself-ie-10
keep browsing more private , and

http://windows.microsoft.com/en-us/windows-8/bitlocker
protect data . Windows 7 users can find the same quick tips with the

http://windows.microsoft.com/en-us/windows7/security-checklist-for-windows-7
Security Checklist for Windows 7 .


http://technet.microsoft.com/windows/jj721671.aspx?ocid=wc-nl-secnews

Windows 8 Jump Start Module 6: Recovery and Security

Educating end users on safe computing is just one facet of securing your infrastructure. Learn how to better control, secure, and manage Windows 8 PCs with BitLocker, UEFI, Secure Boot, Measured Boot, and the Diagnostics and Recovery Toolset (DaRT). This deep-dive course will go over the security features integrated into Windows 8 and then walk you through the process of resetting and refreshing PCs step by step. Want more information on the security improvements in Windows 8 for the IT professional? Read
http://technet.microsoft.com/windows/jj983723.aspx?ocid=wc-nl-secnews
this article  on the Windows TechCenter.


http://www.microsoft.com/security/pc-security/webmail.aspx

Security Features in Outlook.com and Hotmail

Let's face it. Employees often check their personal email accounts from their work PCs. Tell them how the
http://www.microsoft.com/security/pc-security/webmail.aspx
security features available in Outlook.com and Hotmail  can help protect them from spam and fraud; familiarize them with

http://www.microsoft.com/security/online-privacy/phishing-interests.aspx
common phishing scams  that target activities, interests, or news events; and teach them how to better protect themselves from

http://www.microsoft.com/security/online-privacy/phishing-scams.aspx
email and web scams .



Community Update

http://technet.microsoft.com/security/dn194322.aspx

MVP Article of the Month: Corporate Trustworthy Computing Requires Security Awareness
Harry Waldron, Microsoft MVP – Enterprise Security

Training and motivating people to safely use and protect data is challenging in today’s flexible and highly connected environment. Get tips on creating a security awareness program that is adaptable to your organization’s culture and specific business requirements.


Cloud Security Corner

http://technet.microsoft.com/magazine/dn145988.aspx

Cloud Operations and Security

Security has to be a part of the discussion on scale, structure, and organization for the cloud. However, you can still manage and operate immense clouds with a relatively small staff. Learn how recognizing and aggregating patterns is key to efficient and secure cloud operations.


This Month’s Security Bulletins

March 2013 Security Bulletins


Critical

-MS13-021:2809289
https://technet.microsoft.com/en-us/security/bulletin/ms13-021

Cumulative Security Update for Internet Explorer

-MS13-022:2814124
http://technet.microsoft.com/en-us/security/bulletin/ms13-022

Vulnerability in Silverlight Could Allow Remote Code Execution

-MS13-023:2801261
http://technet.microsoft.com/en-us/security/bulletin/ms13-023

Vulnerability in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution

-MS13-024:2780176
http://technet.microsoft.com/en-us/security/bulletin/ms13-024

Vulnerabilities in SharePoint Could Allow Elevation of Privilege


Important

-MS13-025:2816264
http://technet.microsoft.com/en-us/security/bulletin/ms13-025

Vulnerability in Microsoft OneNote Could Allow Information Disclosure

-MS13-026:2813682
http://technet.microsoft.com/en-us/security/bulletin/ms13-026

Vulnerability in Microsoft Office for Mac Could Allow Information Disclosure

-MS13-027:2807986
http://technet.microsoft.com/en-us/security/bulletin/ms13-027

Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation Of Privilege


March 2013 Security Bulletin Resources

-
http://blogs.technet.com/b/msrc/archive/2013/03/12/evolving-response-and-the-march-2013-bulletin-release.aspx

Microsoft Security Response Center (MSRC) Blog Post

-
Security Bulletin Quick Overview (MP4) –

http://content1.catalog.video.msn.com/e2/ds/f1b50c5e-d87d-4a08-bbab-1f271c5b06e5.mp4
3000k  |

http://content1.catalog.video.msn.com/e2/ds/ac2ea554-b370-4556-b05a-84215e72d4cb.mp4
600k  |

http://content2.catalog.video.msn.com/e2/ds/07dfdf25-69e2-4983-b886-7a6aa03459ac.mp4
400k

-
Security Bulletin Webcast (MP4) –

http://content4.catalog.video.msn.com/e2/ds/6f4421e7-16e1-4c61-8e3a-b69f3e10f85f.mp4
3000k  |

http://content4.catalog.video.msn.com/e2/ds/91ea85e4-a99b-478b-b897-3e3df2772d00.mp4
600k  |

http://content5.catalog.video.msn.com/e2/ds/5f565384-56a8-483d-a9a7-c95b9999749f.mp4
400k

-
http://blogs.technet.com/b/msrc/p/march-2013-security-bulletin-q-a.aspx

Security Bulletin Webcast Q&A

Security Events and Training

https://msevents.microsoft.com/CUI/EventDetail.aspx?culture=en-US&EventID=1032538640

TechNet Webcast: Information about the April 2013 Security Bulletin Release
Wednesday, April 10, 2013

Join this webcast for a brief overview of the technical details of April's Microsoft security bulletins. As the goal is to address your concerns, Microsoft security experts devote most of the webcast to answering your questions.


http://www.securitydevelopmentconference.com/

Security Development Conference
May 14–15, 2013 – San Francisco, CA

Hear from leading security experts, grow your professional network, and learn how to implement or accelerate the adoption of secure development practices within your organization. This year's conference is focused on “Proven Practices, Reduced Risk,” and will feature an event keynote from Trustworthy Computing Corporate Vice President Scott Charney supported by tracks on Engineering for Secure Data, Security Development Lifecycle & Data Security, and Business Risk & Data Security. Seating is limited;
https://microsoft.eventcore.com/SDC/RegistrationSelect.aspx
register today  to secure your spot.


https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032538728&culture=en-us

TechNet Webcast: Information about the May 2013 Security Bulletin Release

Wednesday, May 15, 2013

Join this webcast for a brief overview of the technical details of May's Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.


http://northamerica.msteched.com/

TechEd North America 2013
June 3-6, 2013 – New Orleans, LA

Learn how you can achieve your business goals while still protecting your assets and infrastructure. With the Architecture & Trustworthy Computing and Windows Client, Access & Management tracks at this year's TechEd, you'll learn how to provide consistent and secure user experiences for corporate- or employee-owned devices, while also helping to safeguard corporate data and resources through policy compliance and optimized application delivery. Learn how to leverage Microsoft identity and access management solutions for corporate boundary control and information protection, manage a user’s identity across the datacenter and the cloud, provide secure remote access, and define the resources they have access to, based on who they are, what they are accessing, and from what device.
http://northamerica.msteched.com/Registration#fbid=JLEqt9qhac7
Register by March 22, 2013  for early bird pricing.




Essential Tools


-
http://technet.microsoft.com/security/bulletin
Microsoft Security Bulletins

-
http://technet.microsoft.com/security/advisory
Microsoft Security Advisories

-
http://technet.microsoft.com/solutionaccelerators/cc835245.aspx
Security Compliance Manager

-
http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
Microsoft Security Development Lifecycle Starter Kit

-
http://support.microsoft.com/kb/2458544
Enhanced Mitigation Experience Toolkit

-
http://www.microsoft.com/security/pc-security/malware-removal.aspx
Malicious Software Removal Tool

-
http://technet.microsoft.com/security/cc184924.aspx
Microsoft Baseline Security Analyzer


Security Centers


-
http://technet.microsoft.com/security
Security TechCenter

-
http://msdn.microsoft.com/security
Security Developer Center

-
http://www.microsoft.com/security/msrc/default.aspx
Microsoft Security Response Center

-
http://www.microsoft.com/security/portal/
Microsoft Malware Protection Center

-
http://www.microsoft.com/privacy
Microsoft Privacy

-
http://support.microsoft.com/select/default.aspx?target=hub&c1=10750
Microsoft Security Product Solution Centers


Additional Resources


-
http://www.microsoft.com/about/twc/en/us/blogs.aspx
Trustworthy Computing Security and Privacy Blogs

-
http://www.microsoft.com/security/sir
Microsoft Security Intelligence Report

-
http://www.microsoft.com/security/sdl
Microsoft Security Development Lifecycle

-
http://technet.microsoft.com/library/cc162838.aspx
Malware Response Guide

-
http://technet.microsoft.com/security/bb980617.aspx
Security Troubleshooting and Support Resources

microsoft.com/about/twcTrustworthy Computing


This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.



(c) 2013 Microsoft Corporation. All rights reserved. Microsoft, MSDN, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.



Microsoft respects your privacy. To learn more please read our online
http://go.microsoft.com/fwlink/?LinkId=81184
Privacy Statement .



I



Microsoft Corporation

One Microsoft Way

Redmond, WA 98052 USA

Viewing all articles
Browse latest Browse all 8064

Trending Articles