Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Microsoft Security Newsletter - January 2013

$
0
0
Microsoft Security Newsletter – January 2013

Trustworthy Computing | January 2013
Microsoft Security Newsletter

Welcome to January's Security Newsletter!


The theme for this month’s newsletter focuses on the evolving threat landscape. At the end of each year, I am often asked by our readers and customers to provide my thoughts on how the threat landscape will change or evolve in the coming year. While this can be very challenging to predict and I am no Nostradamus, there are indicators that stand out based on our security intelligence that can help provide a glimpse into what the future may hold. Here are five predictions on how I believe the threat landscape will evolve in the coming year:

        - Prediction #1: Criminals will benefit from unintended consequences of espionage.
        - Prediction #2: Attackers will increasingly use apps, movies and music to install malware.
        - Prediction #3: Drive-by attacks and cross-site scripting attacks will continue to be attacker favorites.
        - Prediction #4: Software updating gets easier and exploiting vulnerabilities gets harder.
        - Prediction #5: Rootkits will evolve in 2013.

If you are interested in learning more about these predictions, I encourage you to check out the blog post "
http://blogs.technet.com/b/security/archive/2012/12/13/using-the-past-to-predict-the-future-top-5-threat-predictions-for-2013.aspx
Using the Past to Predict the Future: Top 5 Threat Predictions for 2013 ," which takes a deeper dive into each one of these predictions. I encourage you to share your thoughts with us on our Twitter handle
https://twitter.com/msftsecurityhttps://twitter.com/msftsecurity
@MSFTSecurity .



Best regards,

Tim Rains, Director

Microsoft
Trustworthy
Computing


Top Stories

http://blogs.technet.com/b/security/archive/2013/01/21/compliance-series-software-and-service-security-and-pca-dss-pci-pa-dss.aspx

Software and Service Security and PCI DSS/PA-DSS

Learn how the Microsoft Security Development Lifecycle (SDL) helps organizations meet compliance requirements under the financial sector’s Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS). For details on how the SDL helps organizations meet Health Insurance Portability and Accountability Act (HIPAA) Security Rule compliance requirements,
http://blogs.technet.com/b/security/archive/2013/01/09/compliance-series-microsoft-sdl-helps-orgs-meet-hipaa-standards.aspx
click here .


http://blogs.technet.com/b/security/archive/2013/01/08/automated-collective-action-and-a-safer-more-trusted-internet.aspx

Automated Collective Action and a Safer More Trusted Internet

The Internet population is expected to double from over 2 billion users today to more than 4 billion by 2020. This Microsoft Security Blog post explores some ideas about how to apply existing models from the "real world" to improving the overall health and safety of the Internet.


http://blogs.technet.com/b/security/archive/2013/01/07/operating-system-infection-rates-the-most-common-malware-families-on-each-platform.aspx

Operating System Infection Rates: Most Common Malware Families by Platform

Long term trends indicate that newer operating systems and service packs have lower malware infection rates than older software. Learn about the specific families of threats that are detected most often on Windows 7, Windows Vista, and Windows XP.



Security Guidance

http://technet.microsoft.com/security/jj923069.aspx

Security Tip of the Month: How to Mitigate Against Targeted Cyber Intrusion

Sensitive information, corporate intellectual property, financial information, and private personal data is being lost to cyber intrusions targeted at government agencies and private enterprises. Explore some effective protections that you can put in place without a new investment in technology or personnel.


http://blogs.technet.com/b/markrussinovich/archive/2013/01/07/3543763.aspx

Hunting Down and Killing Ransomware

Scareware, a type of malware that mimics antimalware software, has been around for a decade and shows no sign of going away. In this blog post, Microsoft Technical Fellow Mark Russinovich describes how different variants of ransomware lock the user out of their computer, how they persist across reboots, and how you can use Sysinternals Autoruns to hunt down and kill most current ransomware variants from an infected system.


http://www.microsoft.com/download/details.aspx?id=36036

Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques

Explore Pass-the-Hash (PtH) attacks against Windows operating systems, learn how the attack is performed, and get recommended mitigations for PtH attacks and similar credential theft attacks.


http://technet.microsoft.com/library/hh508763.aspx

Planning for Endpoint Protection in System Center 2012 Configuration Manager

Endpoint Protection in Microsoft System Center 2012 Configuration Manager allows you to manage antimalware policies and Windows Firewall security for client computers in your Configuration Manager hierarchy. Explore prerequisites, best practices, and the administrative workflow with this
http://technet.microsoft.com/library/hh508763.aspx
planning guide  then learn how to
http://technet.microsoft.com/library/hh508764.aspx
configure Endpoint Protection, alerts, and definition updates .


http://technet.microsoft.com/library/jj851145.aspx

Security Features in Office 365 and Office 2013 SKUs

Quickly determine and compare the security features available in the cloud-based Office 365 SKUs and on-premises Office 2013 SKUs. Looking more information on the newest security features in Office 2013 and Office 365? Check out the
http://technet.microsoft.com/en-us/library/cc179050(v=office.15)
Security overview for Office 2013  and the
http://www.microsoft.com/download/details.aspx?id=26552
Security in Office 365  white paper.



Community Update

http://blogs.msdn.com/b/mvpawardprogram/archive/2012/01/30/keeping-your-documents-safe.aspx

Keeping Your Documents Safe

There are a number of technologies that you can use to protect your important documents, whether you’re storing them on your hard drive, storing them in the cloud, or sending them to someone else via email. You’ll find that many of these technologies are built into Microsoft’s operating systems and applications, so you don’t even have to buy or download extra software.




Cloud Security Corner

http://technet.microsoft.com/library/jj676656.aspx

Running an Endpoint Protection Scan with Windows Intune

Windows Intune Endpoint Protection enables quick scans and full system scans to be run automatically or on-demand. A quick scan checks the locations, processes in the memory, and registry files on the hard disk that malicious software, or malware, is most likely to infect. Learn how to initiate an on-demand remote scan or schedule a recurring scan by using Endpoint Protection Policy Agent settings.




This Month’s Security Bulletins

Microsoft Security Bulletin Summary for January 2013


Critical

-MS13-001:2769369
http://technet.microsoft.com/en-us/security/bulletin/MS13-001

Vulnerability in Windows Print Spooler Components Could Allow Remote Code Execution

-MS13-002:2756145
http://technet.microsoft.com/en-us/security/bulletin/MS13-002

Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution

-MS13-008:2799329
http://technet.microsoft.com/en-us/security/bulletin/MS13-008

Security Update for Internet Explorer


Important

-MS13-003:2748552
http://technet.microsoft.com/en-us/security/bulletin/MS13-003

Vulnerabilities in System Center Operations Manager Could Allow Elevation of Privilege

-MS13-004:2769324
http://technet.microsoft.com/en-us/security/bulletin/MS13-004

Vulnerabilities in .NET Framework Could Allow Elevation of Privilege

-MS13-005:2778930
http://technet.microsoft.com/en-us/security/bulletin/MS13-005

Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege

-MS13-006:2785220
http://technet.microsoft.com/en-us/security/bulletin/MS13-006

Vulnerability in Microsoft Windows Could Allow Security Feature Bypass

-MS13-007:2769327
http://technet.microsoft.com/en-us/security/bulletin/MS13-007

Vulnerability in Open Data Protocol Could Allow Denial of Service

January 2013 Security Bulletin Resources:

-
http://blogs.technet.com/b/msrc/archive/2013/01/08/predictions-and-the-january-2013-bulletin-release.aspx

Microsoft Security Response Center (MSRC) Blog Post

-
Security Bulletin Quick Overview (MP4) –

http://content4.catalog.video.msn.com/e2/ds/9f045e96-b754-44b5-9f4a-a2550b683d32.mp4
3000k  |

http://content4.catalog.video.msn.com/e2/ds/38aab65f-fa4e-4f7c-aa3c-cda040aa1cf9.mp4
600k  |

http://content3.catalog.video.msn.com/e2/ds/5b019dc0-7194-47d6-b6a5-62406b5fc3e1.mp4
400k

-
Security Bulletin Webcast (MP4) –

http://content4.catalog.video.msn.com/e2/ds/22612927-1919-4384-83e6-8a11d62dd4a2.mp4
3000k  |

http://content3.catalog.video.msn.com/e2/ds/64c97138-22b1-497a-b24e-788d1ef02dc1.mp4
600k  |

http://content5.catalog.video.msn.com/e2/ds/009cda83-0cdb-4c15-8fc6-9b3a283719c9.mp4
400k

-
http://blogs.technet.com/b/msrc/p/january-2013-security-bulletin-q-a.aspx

Security Bulletin Webcast Q&A

Security Events and Training

https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032538626

TechNet Webcast: Information about the February 2013 Security Bulletin Release
Wednesday, February 13, 2013

Join this webcast for a brief overview of the technical details of February’s Microsoft security bulletins. As the goal is to address your concerns, Microsoft security experts devote most of the webcast to answering your questions.


http://www.securitydevelopmentconference.com/

Security Development Conference
May 14–15, 2013 – San Francisco, CA

Hear from leading security experts, grow your professional network, and learn how to implement or accelerate the adoption of secure development practices within your organization. This year’s conference is focused on "Proven Practices, Reduced Risk," and will feature an event keynote from Trustworthy Computing Corporate Vice President Scott Charney supported by tracks on Engineering for Secure Data, Security Development Lifecycle & Data Security, and Business Risk & Data Security. Registration is now open;
http://www.securitydevelopmentconference.com/registration
register before March 1, 2013  and save 50% off the onsite registration fee. Seating is limited, so early registration is encouraged



Essential Tools


-
http://technet.microsoft.com/security/bulletin
Microsoft Security Bulletins

-
http://technet.microsoft.com/security/advisory
Microsoft Security Advisories

-
http://technet.microsoft.com/solutionaccelerators/cc835245.aspx
Security Compliance Manager

-
http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
Microsoft Security Development Lifecycle Starter Kit

-
http://support.microsoft.com/kb/2458544
Enhanced Mitigation Experience Toolkit

-
http://www.microsoft.com/security/pc-security/malware-removal.aspx
Malicious Software Removal Tool

-
http://technet.microsoft.com/security/cc184924.aspx
Microsoft Baseline Security Analyzer


Security Centers


-
http://technet.microsoft.com/security
Security TechCenter

-
http://msdn.microsoft.com/security
Security Developer Center

-
http://www.microsoft.com/security/msrc/default.aspx
Microsoft Security Response Center

-
http://www.microsoft.com/security/portal/
Microsoft Malware Protection Center

-
http://www.microsoft.com/privacy
Microsoft Privacy

-
http://support.microsoft.com/select/default.aspx?target=hub&c1=10750
Microsoft Product Solution Centers


Additional Resources


-
http://www.microsoft.com/about/twc/en/us/blogs.aspx
Trustworthy Computing Security and Privacy Blogs

-
http://www.microsoft.com/security/sir
Microsoft Security Intelligence Report

-
http://www.microsoft.com/security/sdl
Microsoft Security Development Lifecycle

-
http://technet.microsoft.com/library/cc162838.aspx
Malware Response Guide

-
http://technet.microsoft.com/security/bb980617.aspx
Security Troubleshooting and Support Resources

microsoft.com/about/twcTrustworthy Computing


This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.



(c) 2013 Microsoft Corporation. All rights reserved. Microsoft, MSDN, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

Microsoft respects your privacy. To learn more please read our online
http://go.microsoft.com/fwlink/?LinkId=81184
Privacy Statement .

Microsoft Corporation

One Microsoft Way

Redmond, WA 98052 USA

Viewing all articles
Browse latest Browse all 8064

Trending Articles