Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

Authors
About This Report
Reporting Period
Conventions
Microsoft Malware Protection Center
Microsoft Trustworthy Computing Group
Battling Botnets for Control of Computers
What Is a Botnet?
How Botnets Are Used
How Botnets Work
Defending the Botnet
Botnet Commerce
The Scope of the Problem: Botnet Data and Metrics
Most Active Botnet Families in 2Q10
Other Notable Families
Where’s Confcker?
Operating System Statistics
Geographic Statistics
Spam from Botnets
Fighting Back Against Botnets
Detecting Botnets
Win32/Waledac and the Law: Fighting Botnets in Court
Microsoft Digital Crimes Unit (DCU)
A New Approach
Why Waledac, Why Now?
Technical Action Plan
The Legal Action Plan
Works Cited
Malware Key Findings
Vulnerability Severity
Vulnerability Complexity
Operating System, Browser, and Application Vulnerabilities
Guidance: Developing Secure Software
Vulnerability Reports for Microsoft Products
Coordinated Vulnerability Disclosure
Microsoft Security Bulletins in 2Q10
Usage Trends for Windows Update and Microsoft Update
Update Clients and Services
Guidance: Keeping Your Software Up To Date
Security Breach Trends
Guidance: Preventing and Mitigating Security Breaches
Malware and Potentially Unwanted Software Trends
Infection Rate Calculation Updated
Infection Trends Around the World
Category Trends
Operating System Trends
Malware and Potentially Unwanted Software Families
Rogue Security Software
Threats at Home and in the Enterprise
Spam Trends and Statistics
Guidance: Defending Against Threats in Email
Malicious and Compromised Websites
Analysis of Phishing Sites
Analysis of Malware Hosts
Analysis of Drive-By Download Sites
Automated SQL Injection Attacks
Guidance: Protecting Users from Unsafe Websites
Making Microsoft More Secure
Information Security Policies
Promoting Awareness
Defending Against Malware
Malware Response Case Study
Isolate the Computer
Identify the Malware
Determine How the Malware Starts
How Was the Malware Installed?
Determine Malware Connectivity
Remediate the Malware
Recommendations
Appendices
Appendix A: Threat Naming Conventions
Appendix B: Data Sources
Microsoft Products and Services
Appendix C: Worldwide Bot Infection Rates
Threat Families Referenced in This Report
0 of .
Results for:
No results containing your search query
P. 1
Microsoft Security Intelligence Report Volume 9 Jan-June2010 English

Microsoft Security Intelligence Report Volume 9 Jan-June2010 English

Ratings: (0)|Views: 45|Likes:
Published by elhoim

More info:

Published by: elhoim on Oct 16, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/10/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 57 are not shown in this preview.
You're Reading a Free Preview
Pages 61 to 76 are not shown in this preview.
You're Reading a Free Preview
Pages 80 to 122 are not shown in this preview.
You're Reading a Free Preview
Pages 126 to 136 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->