Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

Authors
Key Findings from the Microsoft Malware Protection Center
Global Malicious and Potentially Unwanted Software Trends
Key Findings from the Microsoft Security Response Center
Vulnerability Disclosures for Microsoft Products
Key Findings from the Microsoft Security Engineering Center
Security Science: Exploit Trends
Executive Foreword
Trustworthy Computing: Security Engineering at Microsoft
Microsoft Security Engineering Center
Exploit Trends
Top Browser-Based Exploits
Analysis of Drive-By Download Pages
Document File Format Exploits
Mitigating Exploits with Windows Security Improvements
Automated SQL Injection Attacks
Security Breach Trends
Microsoft Security Response Center
Industry-Wide Vulnerability Disclosures
Vulnerability Disclosures
Vulnerability Severity
Vulnerability Complexity
Operating System and Browser Vulnerabilities
Vulnerability Reports for Microsoft Products
Responsible Disclosures
Microsoft Security Bulletins in 2H09
Usage Trends for Windows Update and Microsoft Update
Update Clients and Services
Updates and Supportability
Microsoft Malware Protection Center
Malware and Potentially Unwanted Software Trends
Infection Rates and CCM
Geographic Trends
Category Trends
Operating System Trends
Malware and Potentially Unwanted Software Families
User Reaction to Alerts
Trends in Sample Proliferation
Rogue Security Software
Threat Combinations
E-Mail Threats
Spam Trends and Statistics
Geographic Origins of Spam Messages
Spam from Botnets
Malicious Web Sites
Analysis of Phishing Sites
Analysis of Malware Hosts
User Reaction to SmartScreen Warnings
Malware Patterns Around the World
Full Geographic Data
Threat Assessments for Individual Locations
Netherlands
United Arab Emirates
United Kingdom
Mitigation Strategies for Protecting Networks, Systems, and People
Practicing What We Preach
Protecting Your Organization
Protecting Against Malicious and Potentially Unwanted Software
Protecting Enterprise Networks
Securing ActiveX Controls
Guarding Against SQL Injection
Protecting Your People
Afterword
Microsoft Malware Protection Center Executive Afterword
Appendixes
Appendix A: Threat Naming Conventions
Appendix B: Data Sources
Microsoft Products and Services
botnet
cross-site scripting
in the wild
malware impression
monitoring tool
parser vulnerability
password stealer (PWS)
phishing impression
trojan downloader/dropper
vulnerability
Threat Families Referenced in This Report
0 of .
Results for:
No results containing your search query
P. 1
Microsoft Security Intelligence Report Volume8 July-Dec2009 English

Microsoft Security Intelligence Report Volume8 July-Dec2009 English

Ratings: (0)|Views: 465 |Likes:
Published by merlin2007

More info:

Published by: merlin2007 on May 04, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/01/2011

pdf

text

original

You're Reading a Free Preview
Pages 5 to 35 are not shown in this preview.
You're Reading a Free Preview
Pages 40 to 154 are not shown in this preview.
You're Reading a Free Preview
Pages 159 to 222 are not shown in this preview.
You're Reading a Free Preview
Pages 228 to 248 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->