Skip to main content
Microsoft Security

Microsoft Security Blog

Published
<1 minute read

Internet Explorer 8: Stay safer online 

Want to learn how the latest Web browser from Microsoft offers increased protection against phishing, malware, and other online threats? Internet Explorer 8 provides you and your family with a safer online experience with features like the SmartScreen filter. SmartScreen is a set of technologies designed to help protect you from evolving Web and social […]

Published
<1 minute read

President of France not immune to online theft 

According to the Associated Press, French police said that in October of this year they arrested two men for breaking into the personal bank account of French President Nicolas Sarkozy. The BBC says that the Internet hackers probably didn’t know that it was Sarkozy’s account they were stealing money from, a reminder that none of us are […]

Published
<1 minute read

Free Microsoft antispyware site helps you protect your computer 

Microsoft just launched a new Windows Defender Web site dedicated to helping you fight spyware. The new Windows Defender site features: Links to download Windows Defender, the free antispyware program from Microsoft. A new video demo that explains how to use Windows Defender to defend your computer from spyware and other unwanted software. A list […]

SDL Training 

Hi everyone, Shawn Hernan here. Being a security guy is incredibly rewarding because you get to look at virtually any part of a product, from kernel drivers to web services to user education to sales and servicing. You have to do that because a failure in one of those areas can endanger the security of […]

Tailored AI insights from Microsoft Security Copilot

Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI.

Published
4 min read

Giving SQL Injection the Respect it Deserves 

You may have read recently about a large number of Web servers that were compromised through a SQL injection attack. The malicious SQL payload is very well designed, somewhat database schema agnostic and generic  so it could compromise as many database servers as possible. While the attack was a SQL injection attack that attacked and […]

Published
2 min read

Training People on Threat Modeling 

  Adam Shostack here. Blogger Ian Grigg has an interesting response to my threat modeling blog series, and I wanted to respond to it. In particular, Ian says “I then would prefer to see the threat – property matrix this way:” I wanted to share an additional table from our training, and talk about repudiation […]

Go beyond data protection with Microsoft Purview

Govern, protect, and manage all of your data with Microsoft Purview, comprehensive solutions to help give you better visibility and control.

Published
1 minute read

Is it safe to install ActiveX controls on my computer? 

A lot of you have recently asked us about ActiveX controls. Here’s an example of a message you might have seen: What are ActiveX controls? ActiveX controls are small programs, sometimes also called “add-ons,” used on the Internet. They can make browsing more enjoyable by allowing animation or they can help with tasks such as […]

Published
1 minute read

STRIDE chart 

There are good reasons to optimize for different points on that spectrum (of better/faster/cheaper) at different times in different products.