• Accenture
  • Cybercrime
    • Crime
    • Terrorism
  • Fun
  • Government
    • Critical Infrastructure Protection
    • Law Enforcement
    • Legislation
  • Industry
    • Associations
    • Cloud Computing
    • Consumerization of IT
    • Events/Trainings
    • General
    • Incidents
    • Internet of Things
    • Open Source
    • Outsourcing
    • Piracy
    • Social Media
    • Technology
    • Trends
  • Intergovernmental Organizations
  • Microsoft
    • Cloud Computing
    • Consumer
    • Incidents
    • Partner
    • Processes
    • Products
    • Strategy
  • Privacy
  • Security
    • People
    • Policy
    • Process
    • Technology
Catagories
Roger Halbheer on SecurityRoger Halbheer on Security
Roger Halbheer on Security
Information Security Discussion

Roger Halbheer on Security

  • Home
  • Downloads
  • My Photo Gallery
  • Bio and Contact
  • Blogroll
    • Chief Security Advisor Microsoft Finland
    • Chief Security Advisor Microsoft Italy
    • Chief Security Advisor Microsoft Russia
    • Chief Security Advisor Microsoft South Africa
    • Chief Security Advisor Microsoft Switzerland
    • Chief Security Advisor GCR (Chinese)
    • Chief Security Advisor Germany
    • Gerhard Göschl (Microsoft Austria)
    • Microsoft’s Security Blog
    • Trustworthy Computing
    • Microsoft Switzerland Security Blog
    • Shoaib Yousuf
  • Tweetroll
    • Roger Halbheer
    • Henk van Roest
    • Microsoft Security Response
    • Microsoft Digital Crimes Unit
Menu back  
LinkedinRssTwitterXING
Find
Date Name
DescAsc

Armored truck robber uses Craigslist to make getaway

This is really clever (sounds like Hollywood but it seems to be real): In a move that could be right out of a Hollywood movie, a brazen crook apparently used a Craigslist ad to hire a dozen unsuspecting decoys to help him make his getaway following a robbery outside a bank on Tuesday. He then…

Details
October 5, 2008Leave a commentCrime, Incidents, Law Enforcement, TrendsBy Roger Halbheer

Hacking is destroying economic growth

As usual (and probably as most of you) I started today scanning through my mails and RSS feeds for important and urgent information. By doing that, I stumbled across an article called Hackers and Nigeria vulnerability to cyber terrorism and I started to read it. As you know, I blogged several times already on the…

Details
September 26, 2008Leave a commentGeneral, Incidents, Technology, TrendsBy Roger Halbheer

Why you should move to IPv6 – NOW!

Honestly, if you are not living in China it might not be that urgent but read yourself: China running out of IP addresses

Roger

September 26, 2008Leave a commentTechnology, TrendsBy Roger Halbheer

Information Accountability

I just read a pretty interesting paper; you should have a look at. The interesting thing is – from my point of view – the paper is close to your End to End Trust paper we published in March. What I want to say with that is, that it seems that several forces in the…

Details
September 24, 2008Leave a commentPolicy, Process, TrendsBy Roger Halbheer

Suspended Jail for Hacking Tutorial in France

This is pretty remarkable from my point of view: In 2005 our Forensic team together with our Investigators obtained the identification and arrest of M. Jean-Charles S. for the illegal distribution of a hacking tutorial against MSN Hotmail and MSN Messenger users. On June 12, 2008 the Tribunal Correctionnel (criminal court in France) sentenced this…

Details
September 22, 2008Leave a commentCrime, Law Enforcement, LegislationBy Roger Halbheer

Rent a Botnet on eBay (Part 2)

You might have seen my recent blogpost on the botnet on eBay. They have seen it (we touched base with them as well)– now it’s gone:

Cool!!

Roger

September 12, 2008Leave a commentCrime, Law Enforcement, Policy, ProcessBy Roger Halbheer

Renting a Botnet on eBay

It is getting better over time: Now you can rent a Botnet on eBay to increase your hitrate on YouTube (By the way: Free shipping is included):

|39%3A1|66%3A2|65%3A12|240%3A1318&_trksid=p3286.c0.m14

Roger

September 11, 2008Leave a commentCrime, Policy, Process, TrendsBy Roger Halbheer

Why I do not like e-Voting (Part 2)

As you might know, I blogged on e-Voting recently (Why I do not like e-Voting) and got quite some reactions. A few here but most of them privately. Most of you seem to like e-Voting. Now, think again! Look at this article here Evaluating the Security of Electronic Voting Systems. There is a video in…

Details
September 9, 2008Leave a commentCrime, Legislation, Process, Technology, TrendsBy Roger Halbheer

This is about processes: Google Chrome Vulnerable to Carpet Bombing

This is the kind of stuff I hate to see – definitely within Microsoft but to a similar extent within competitors. I think we have a joint mission: Make the Internet a safer (and more trustworthy) place. There was quite some noise yesterday around Google Chrome. And a lot of noise about “safer browsing” and…

Details
September 3, 2008Leave a commentProcessBy Roger Halbheer

Servers still not patched

I just read an article this morning on Linux servers under the Phalanx gun: A problem with people, not code. There were quite some things which made me think when I read it: There was a statement in there, which I – obviously – did not like at all: Linux may be inherently more secure…

Details
August 29, 2008Leave a commentPolicy, ProcessBy Roger Halbheer

Why I do not like e-Voting

As you know, I am Swiss. Switzerland is known as being one of the most direct democracies in the world. It is not uncommon for us having (or being allowed) to vote every other month as there are a lot of ways to influence what our politicians and/or our government does. This makes the system…

Details
August 29, 2008Leave a commentLegislationBy Roger Halbheer

„Scareware“ on the Raise

We have regular ConfCalls with our security support to exchange trends and issues we see. During the last one we had an interesting discussion I would like to share with you: We seem to get a hell lot of calls mainly from the consumer segment with Virus/Trojan/Spyware infections. The way they get the malware is…

Details
August 29, 2008Leave a commentConsumer, Policy, ProcessBy Roger Halbheer

IE8 – a new Set of Privacy Features

As you (hopefully) know, the release of Internet Explorer 8 is coming closer. One thing we always look at is how to make surfing more secure and more private. The IE team just launched a blog post on the InPrivate features of IE 8 which is definitely worth looking at: IE8 and Privacy

Roger

August 26, 2008Leave a commentConsumer, Processes, Products, StrategyBy Roger Halbheer

How to circumvent Privacy Laws

As you all know, most jurisdictions allow individuals to ask for data collected by an organization (being it a company or a governmental organization). A lot of countries have Data Protection Commissioners that look into what companies and more often governments do with regards to PII (Personal Identifiable Information). After 9/11 the United States forced…

Details
August 20, 2008Leave a commentCrime, Law Enforcement, Privacy, TerrorismBy Roger Halbheer

Your PIN on the Internet

Yes, it is true: There is somebody who publically put known PINs on the Internet. I bet yours is there too: http://www.positiveatheism.org/crt/pin.htm

Roger

August 20, 2008Leave a commentFunBy Roger Halbheer

Secure Development: More than „just“ code!

I just read an interesting post by Michael Howard (Security is bigger than finding and fixing bugs). He refers to a statement Google seem to have made on its development practices (Google shares its security secrets): In order to keep its products safe, Google has adopted a philosophy of ‘security as a cultural value’. The…

Details
August 18, 2008Leave a commentProcessesBy Roger Halbheer

Insights into Windows 7 Engineering

Are you interested to learn how Windows 7 (next version of Windows) is engineered? Are you willing to get in touch with the engineering team? Then read their blog: Engineering Windows 7

Roger

August 18, 2008Leave a commentProcesses, Products, StrategyBy Roger Halbheer

The Global Network of Crime

We all know that crime is global and that they are doing their best to leverage the legal shortcomings and the limitations of the cooperation between Law Enforcement agencies. There is a good article about one case in the New York Times which is definitely worth reading:

Global Trail of an Online Crime Ring

Roger

August 13, 2008Leave a commentCrime, Cybercrime, TerrorismBy Roger Halbheer

Announcement of the MSRC Ecosystem Strategy Team Blog

Our teams around the Microsoft Security Response Center recently launched a new blog called MSRC Ecosystem Strategy Team Blog. The blog is thought to give more insights into the work we do with the security ecosystem knowing that vulnerabilities and attacks today not “only” affect Microsoft products but very often the Internet as such –…

Details
August 6, 2008Leave a commentMicrosoft, ProcessesBy Roger Halbheer

Security through Collaboration

If you ever heard me keynote an event you know that one of the key messages I have is, that partnerships are necessary in order to be able to protect against today’s threats. At Black Hat USA we just announced a new program called Microsoft Active Protections Program. The program is designed to give security…

Details
August 6, 2008Leave a commentAssociations, Incidents, Processes, TrendsBy Roger Halbheer
1
2345678910111213141516171819202122232425262728293031323334353637
…3839404142…
43
44
Prev pageNext page
Tag Cloud
Calendar
May 2022
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Aug    
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Copyright by Roger Halbheer Dream-Theme — truly premium WordPress themes