Podcast: Integrating Privacy Practices into the Software Development Life Cycle

This week Kim Howell, Director of Privacy Governance in the Microsoft Trustworthy Computing Group, and Ralph Hood Lead Program Manager for the Security Development Lifecycle (SDL) in Microsoft Trustworthy Computing Group. Participated in a podcast on “Integrating Privacy Practices into the Software Development Life Cycle,” with the Computer Emergency Readiness Team (CERT):     Integrating…

0

Microsoft Donates PhotoDNA to Fight Child Abuse

From the Microsoft on the Issues Blog: Posted by Ernie AllenPresident & CEO, National Center for Missing and Exploited Children For most of us, the word “childhood” conjures up thoughts of innocence and security. But for thousands of children, it is shrouded by darkness and pain, because of the vilest kind of sexual abuse and…

0

Plagued by the Privacy Center? Learn how to remove it

We recently received several e-mails to this blog like this: Why can I not get past the privacy Center screen so I can get to the settings?  I want to disable this program.  It is useless and it will not let me use my computer.   It turns out there is a “scareware” program, aka rogue…

0

Safer Online Shopping with Internet Explorer 8

From the Microsoft Windows Blog: Yesterday was what is known as “Cyber Monday,” which is the first Monday after Black Friday every year and is one of the top online shopping days here in the United States. Cyber Monday is when people move to the Web to make purchases they missed in stores during Black…

1

Microsoft and the FTC: A Continued Focus on Privacy

From the Microsoft On The Issues Blog: Posted by David Bowermaster Administrator, Microsoft on the Issues The Federal Trade Commission’s roundtable series on “Exploring Privacy” begins today in Washington, D.C.   Microsoft Associate General Counsel Mike Hintze is participating in the first panel of the day, entitled “Benefits and Risks of Collecting, Retaining and Using Consumer…

0

Do and don’ts for p@$$w0rd$

From the Microsoft Malware Protection Center Blog: Almost a year ago, we started a project designed to monitor incoming attacks against a normal user on a day-to-day basis. We presented you with details about the geographical area from where the attacks originated and what services were targeted, and we gave you just a hint about…

0

Identity Roadmap Presentation at PDC09

Kim Cameron, the Chief Architect of Identity in the Identity and Security Division at Microsoft writes on his Identity Blog:   Earlier this week I presented the Identity Keynote at the Microsoft Professional Developers Conference (PDC) in LA.  The slide deck is here, and the video is here. After announcing the release of the Windows Identity Foundation (WIF)…

0

Microsoft Bing Confims Commitment to Comprehensive Results

From Adam Sohn on the Bing Blog:   There’s been some buzz today based on a post by Nicholas D. Kristof at the New York Times suggesting that Bing filters results for searches conducted outside of the People’s Republic of China (PRC) using Simplified Chinese characters for their query. As Mr. Kristof reported over the…

0

The Week in Privacy – November 13 , 2009

Social Networking Site Tagged Pays $500,000 to Settle Privacy Violations New York had accused Tagged.com of sending more than 60 million emails stating that friends had sent some photos, which in fact did not exist, and that recipients were told to sign up for Tagged.com to access them. The company would then use these contacts…

0

Phishing – what is is, and how it relates to your webmail credentials

The Windows Live team blogs writes: Thanks to coordinated efforts across the tech industry, and partnerships between industry players who are a part of the Anti-Phishing working group, over the years most web services, users and other applications have become smarter at spotting tricks like link manipulation, phone phishing, and forged websites. Cybercriminals have adapted…

0