Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Microsoft Security Intelligence Report Volume8 July-Dec2009 English

Microsoft Security Intelligence Report Volume8 July-Dec2009 English

Ratings: (0)|Views: 80|Likes:
Published by mxxh

More info:

Published by: mxxh on Oct 20, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/21/2011

pdf

text

original

 
Microsoft Security Intelligence Report
Volume 8
July through December 2009
 An in-depth perspective onsoware vulnerabilities and exploits,malicious code threats, and  potentially unwanted soware, ocusing on the second hal o 2009
 
2
Microsoft Security Intelligence Report
Microsot Security Intelligence Report
Te inormation contained in this document represents the current view o MicrosoCorporation on the issues discussed as o the date o publication. Because Microso mustrespond to changing market conditions, it should not be interpreted to be a commitmenton the part o Microso, and Microso cannot guarantee the accuracy o any inormationpresented aer the date o publication.his document is or inormational purposes only. MICROSOF MAKES NO WAR-RANIES, EXPRESS, IMPLIED, OR SAUORY, AS O HE INFORMAION INHIS DOCUMEN.Complying with all applicable copyright laws is the responsibility o the user. Withoutlimiting the rights under copyright, no part o this document may be reproduced, storedin or introduced into a retrieval system, or transmitted in any orm or by any means(electronic, mechanical, photocopying, recording, or otherwise), or or any purpose,without the express written permission o Microso Corporation.Microsot may have patents, patent applications, trademarks, copyrights, or otherintellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement rom Microsot, the urnishing o thisdocument does not give you any license to these patents, trademarks, copyrights, or otherintellectual property.Copyright © 2010 Microso Corporation. All rights reserved.Microso, the Microso logo, Active Directory, ActiveX, AppLocker, Bing, the Bing logo,BitLocker, Excel, Foreront, Hotmail, Internet Explorer, MSN, OneCare, Outlook,the Security Shield logo, SmartScreen, SQL Server, Visual C++, Visual Studio, Windows,the Windows logo, Windows Live, Windows Media, Windows Server, and Windows Vistaare either registered trademarks or trademarks o Microso Corporation in the United Statesand/or other countries.Te names o actual companies and products mentioned herein may be the trademarkso their respective owners.
 
3
 
July through December 2009
Authors
Bret Arsenault
 Microso Inormation Security
Darren Canavor
 Microso Security Engineering Center 
Eva Chow
 Microso Inormation Security
Joe Faulhaber
 Microso Malware Protection Center 
Vinny Gullotto
 Microso Malware Protection Center 
Paul Henry 
Wadeware LLC
Robert Hensing
 Microso Security Response Center 
Yuhui Huang
 Microso Malware Protection Center 
Je Jones
 Microso rustworthy Computing 
Jimmy Kuo
 Microso Malware Protection Center 
John Lambert
 Microso Security Engineering Center 
Ken Malcolmson
 Microso rustworthy Computing 
Bala Neerumalla
 Microso Secure SQL Initiative eam
Anthony Penta
 Microso Windows Saety Platorm
Paul Pottor 
Windows Consumer Product Management 
im Rains
 Microso rustworthy Computing 
Christian Seiert
Bing 
Javier Salido
 Microso rustworthy Computing 
Frank Simorjay 
 Microso rustworthy Computing 
Holly Stewart
 Microso Malware Protection Center 
Adrian Stone
 Microso Security Response Center 
Matt Tomlinson
 Microso Security Response Center 
Je Williams
 Microso Malware Protection Center 
Scott Wu
 Microso Malware Protection Center 
erry Zink 
 Microso Foreront Online Protection or Exchange
Contributors
Teresa Burch
 Microso Security Essentials
Doug Cavit
 Microso rustworthy Computing 
Enrique Gonzalez
 Microso Malware Protection Center 
Cristin Goodwin
 Microso Legal and Corporate Aairs
Roger Grimes
 Microso Inormation Security
Karl Hanmore
 Microso Security Response Center 
Satomi Hayakawa
 Microso Japan Security Response eam
Japan Security Response eam
 Microso Japan
Hilda Larina Ragragio
 Microso Malware Protection Center 
Laura Lemire
 Microso Legal and Corporate Aairs
Nishanth Lingamneni
 Microso Security Essentials
Ziv Mador
 Microso Client, Management and Protection
Charles McColgan
 Microso ISD
Ritesh Mordani
 Microso Foreront Online Protection or Exchange
Price Oden
 Microso Inormation Security
Sasi Parthasarath
Bing 
Daryl Pecelj
 Microso Inormation Security
Kathy Phillips
 Microso Legal and Corporate Aairs
areq Saade
 Microso Malware Protection Center 
Jireh Sanico
 Microso Malware Protection Center 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->