Happy new year and thank you to our abiding readers!

We wish all our readers a happy new Year, all the best for 2007 and please stay with us! đź™‚And if you’re still looking for a good intent, then be an active part of our blog! With the best regardsUrs


First Line of Defense Against Data Security Breaches: Employees

A recent survey of the IT departments in 461 U.S. organizations conducted by the Ponemon Institute reported that the average annual cost of managing insider threats to data security is $3.4 million per organization. Further, more than 78 percent of respondents reported one or more unreported insider-related security breaches within their company. http://www.law.com/jsp/article.jsp?id=1167300410341  Urs


Online Security Sessions from TechEd IT Forum Available

See the TechEd/IT Forum security sessions online (Referenz: Michael Howard):http://blogs.msdn.com/michael_howard/archive/2006/12/21/online-security-sessions-from-teched-it-forum-available.aspx Urs  


Microsoft sees botnets as top ’07 Net threat

“Botnets are really where it’s at for serious cybercriminals, because of their concentrated power,” said Kornblum, a senior attorney with Microsoft Corp.’s Internet Safety Enforcement team. “That power can be used for all sorts of malicious conduct on the Internet.” See the article on Computerworld:http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9006818&source=rss_topic82 Urs  


Controlling Communication with the Internet (Windows XP SP2 and Windows Vista)

The Microsoft® Windows Vista™ operating system and the Windows® XP operating system with Service Pack 2 (SP2) include a variety of technologies that communicate with the Internet to provide increased ease of use and functionality. Browser and e-mail technologies are obvious examples, but there are also technologies such as automatic updating that help users obtain…


Jim Allchin on Windows Vista and protection from malware

Jim Allchins answer to the Sophos November report on Vista… Very interessting! http://windowsvistablog.com/blogs/windowsvista/archive/2006/12/19/windows-vista-and-protection-from-malware.aspx Urs


Vista: Group Policy Settings Reference

This spreadsheet lists the policy settings for computer and user configurations included in the administrative template files (admx/adml) delivered with Windows Vista (RTM build 6000). The policy settings included in this spreadsheet cover Windows Vista, Microsoft Windows Server 2003, Windows XP Professional, and Windows 2000. These files are used to expose policy settings when you…


The new generation of cyber criminals

A new research by the security company McAfee revealed that  groups of cyber criminals are recruiting young computer students using tactics echoing those employed by the KGB during  the cold war. The report, which is based on several contributions from Europe’s leading hi-tech crime units and the FBI, highlights a new trend among cyber crime…


Buffer Overflows for Beginners (Whitepaper)

Not for begginers in C++, but as an example of how to produce/avoid vulnerable code…http://www.milw0rm.com/papers/123 Urs


Vista: Multiple Local Group Policy Objects (MLGPO)

How to use and setup multiple local GPOs in Vista:http://www.windowsecurity.com/articles/Managing-Windows-Vista-Group-Policy-Part2.html Urs