Skip to main content
Microsoft Security

Microsoft Security Blog

Published
<1 minute read

Internet Explorer 8: Stay safer online 

Want to learn how the latest Web browser from Microsoft offers increased protection against phishing, malware, and other online threats? Internet Explorer 8 provides you and your family with a safer online experience with features like the SmartScreen filter. SmartScreen is a set of technologies designed to help protect you from evolving Web and social […]

Published
<1 minute read

President of France not immune to online theft 

According to the Associated Press, French police said that in October of this year they arrested two men for breaking into the personal bank account of French President Nicolas Sarkozy. The BBC says that the Internet hackers probably didn’t know that it was Sarkozy’s account they were stealing money from, a reminder that none of us are […]

Published
<1 minute read

Free Microsoft antispyware site helps you protect your computer 

Microsoft just launched a new Windows Defender Web site dedicated to helping you fight spyware. The new Windows Defender site features: Links to download Windows Defender, the free antispyware program from Microsoft. A new video demo that explains how to use Windows Defender to defend your computer from spyware and other unwanted software. A list […]

SDL Training 

Hi everyone, Shawn Hernan here. Being a security guy is incredibly rewarding because you get to look at virtually any part of a product, from kernel drivers to web services to user education to sales and servicing. You have to do that because a failure in one of those areas can endanger the security of […]

Streamline privacy management with Microsoft Priva

Protect and govern personal information, reduce privacy risks, and manage subject rights requests at scale with Microsoft Priva privacy risk management solutions.

Published
4 min read

Giving SQL Injection the Respect it Deserves 

You may have read recently about a large number of Web servers that were compromised through a SQL injection attack. The malicious SQL payload is very well designed, somewhat database schema agnostic and generic  so it could compromise as many database servers as possible. While the attack was a SQL injection attack that attacked and […]

Published
2 min read

Training People on Threat Modeling 

  Adam Shostack here. Blogger Ian Grigg has an interesting response to my threat modeling blog series, and I wanted to respond to it. In particular, Ian says “I then would prefer to see the threat – property matrix this way:” I wanted to share an additional table from our training, and talk about repudiation […]

Retain Microsoft Security Experts

Microsoft Security Experts are now available to strengthen your team with managed security services. Learn how to defend against threats with security experts.

Published
1 minute read

Is it safe to install ActiveX controls on my computer? 

A lot of you have recently asked us about ActiveX controls. Here’s an example of a message you might have seen: What are ActiveX controls? ActiveX controls are small programs, sometimes also called “add-ons,” used on the Internet. They can make browsing more enjoyable by allowing animation or they can help with tasks such as […]

Published
1 minute read

STRIDE chart 

There are good reasons to optimize for different points on that spectrum (of better/faster/cheaper) at different times in different products.