Trace Id is missing

Unlock your potential with Microsoft Copilot

Get things done faster and unleash your creativity with the power of AI anywhere you go.
Microsoft Copilot app being utilized to generate pictures of a singing dog, assisting to identify a flower, and helping to generate an email to congratulate a coworker on a promotion.

Microsoft Security Intelligence Report volume 11 (January - June 2011)

This is the eleventh volume of the Microsoft Security Intelligence Report.

Important! Selecting a language below will dynamically change the complete page content to that language.

  • Version:

    1.0

    Date Published:

    10/10/2011

    File Name:

    Microsoft_Security_Intelligence_Report_volume_11_Advanced_Malware_Cleaning_Techniques_for_the_IT_Professional_English.pdf

    Microsoft_Security_Intelligence_Report_volume_11_English.pdf

    Microsoft_Security_Intelligence_Report_volume_11_Key_Findings_Summary_English.pdf

    Microsoft_Security_Intelligence_Report_volume_11_Promoting_Safe_Browsing_English.pdf

    Microsoft_Security_Intelligence_Report_volume_11_Regional_Threat_Assessments_English.pdf

    Microsoft_Security_Intelligence_Report_volume_11_Worldwide_Threat_Assessment_English.pdf

    Microsoft_Security_Intelligence_Report_volume_11_Zeroing_in_on_Malware_Propagation_Methods_English.pdf

    File Size:

    778.8 KB

    6.1 MB

    889.1 KB

    389.2 KB

    8.9 MB

    4.4 MB

    924.2 KB

    Volume 11 of the Microsoft® Security Intelligence Report provides an in-depth perspective on malicious and potentially unwanted software, software exploits, security breaches and software vulnerabilities (both in Microsoft software and in third-party software). Microsoft developed these perspectives based on detailed analysis over the past several years, with a focus on the first half of 2011.
  • Supported Operating Systems

    Windows 2000 Server, Windows 7, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP

    Any supported Operating System
  • Download the full SIR, Worldwide Threat Assessment, Key Findings Summary and Regional Threat Assessments. All are available as a PDF.

Follow Microsoft