Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

About This Report
Reporting Period
Data Sources
Executive Foreword
Trustworthy Computing: Security Engineering at Microsoft
Melissa Plus 10: Keeping People Safe in the Age of Malware
Ten Years of Malware and Security Threats, 1999–2009
Computer Security Today: Working Together to Close the Gap
Case Study: The Conficker Working Group
Strategies, Mitigations, and Countermeasures
Geographic Trends
Best Practices Around the World
Category Trends
Operating System Trends
Malware and Potentially Unwanted Software Families
User Reaction to Alerts
Trends in Sample Proliferation
Threats at Home and in the Enterprise
Malware and Signed Code
Threat Combinations
E-Mail Threats
Spam Trends and Statistics
Geographic Origins of Spam Messages
Reputation Hijacking
Malware in E-Mail
A Defense-in-Depth Strategy for E-Mail
Malicious Web Sites
Analysis of Phishing Sites
Analysis of Malware Hosts
“Malvertising”: An Emerging Industry Threat
Top Malware and Spam Stories of 1H09
Win32/Conficker Update
What Happened on April 1?
Rogue Security Software Still a Significant Threat
Automated SQL Injection Attacks
Win32/Koobface Attacks Social Networks
The Win32/Waledac Botnet and Spam
Rogue ISP 3FN Taken Down
Prolific Spammer Alan Ralsky Pleads Guilty
Microsoft Security Engineering Center
Exploit Trends
Top Browser-Based Exploits
Analysis of Drive-By Download Pages
Document File Format Exploits
Security Breach Trends
Social Security Numbers and Confidentiality
Guidance for Organizations: Protecting Against a Data Breach
Microsoft Security Response Center
Industry-Wide Vulnerability Disclosures
Vulnerability Disclosures
Vulnerability Disclosure Date vs. Publication Date
Vulnerability Severity
Vulnerability Complexity
Operating System and Browser Vulnerabilities
Vulnerability Reports for Microsoft Products
Responsible Disclosures
Microsoft Security Bulletins in 1H09
More Vendors Adopting Scheduled Release Strategies
Exploitability Index
Usage Trends for Windows Update and Microsoft Update
Update Clients and Services
Regional Variations in Update Service Usage
Call to Action: End to End Trust
Appendix A: Full Geographic Data
Appendix B: Threat Assessments for Individual Locations
South Africa
United Kingdom
United States
Appendix C: Data Sources
Microsoft Products and Services
Software Vulnerability and Breach Data
Appendix D: Microsoft Security Bulletins in 1H09
cross-site scripting
See password stealer (PWS)
malware impression
monitoring tool
parser vulnerability
password stealer (PWS)
phishing impression
responsible disclosure
trojan downloader/dropper
0 of .
Results for:
No results containing your search query
P. 1
Microsoft Security Intelligence Report Volume 7 Jan-Jun2009

Microsoft Security Intelligence Report Volume 7 Jan-Jun2009

Ratings: (0)|Views: 28|Likes:
Published by Jeff Maynard

More info:

Published by: Jeff Maynard on Nov 10, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 9 are not shown in this preview.
You're Reading a Free Preview
Pages 14 to 34 are not shown in this preview.
You're Reading a Free Preview
Pages 39 to 161 are not shown in this preview.
You're Reading a Free Preview
Pages 166 to 187 are not shown in this preview.
You're Reading a Free Preview
Pages 192 to 232 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->