Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Microsoft Security Intelligence Report Volume 11

Microsoft Security Intelligence Report Volume 11

Ratings: (0)|Views: 184 |Likes:
Published by MSFTSIR
Volume 11 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and potentially unwanted software, software exploits, security breaches and software vulnerabilities (both in Microsoft software and in third-party software). Microsoft developed these perspectives based on detailed analysis over the past several years, with a focus on the first half of 2011.
Volume 11 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and potentially unwanted software, software exploits, security breaches and software vulnerabilities (both in Microsoft software and in third-party software). Microsoft developed these perspectives based on detailed analysis over the past several years, with a focus on the first half of 2011.

More info:

Published by: MSFTSIR on Oct 24, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/27/2011

pdf

text

original

 
 Microsoft Security Intelligence Report
Volume 11
 An in-depth perspective onsoftware vulnerabilities and exploits,malicious code threats, and potentially unwanted softwarein the first half of 2011
 
ii
Microsoft Security Intelligence Report
This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THEINFORMATION IN THIS DOCUMENT.
This document is provided “as
-
is.” Information and views expressed in this
document, including URL and other Internet Web site references, may changewithout notice. You bear the risk of using it.Copyright © 2011 Microsoft Corporation. All rights reserved.The names of actual companies and products mentioned herein may be thetrademarks of their respective owners.
 
iii
Authors
 
 Joe Faulhaber
Microsoft Malware ProtectionCenter 
David Felstead
Bing
Paul Henry
Wadeware LLC 
 Jeff Jones
Microsoft TrustworthyComputing
 
Ellen Cram Kowalczyk 
Microsoft TrustworthyComputing
 Jimmy Kuo
Microsoft Malware ProtectionCenter 
 John Lambert
Microsoft SecurityEngineering Center 
Marc Lauricella
Microsoft TrustworthyComputing
Aaron Margosis
Microsoft Public Sector Services
Michelle Meyer
Microsoft TrustworthyComputing
Anurag Pandit
Windows Live SafetyPlatform
Anthony Penta
 
Windows Live SafetyPlatform
 Dave Probert
Microsoft SecurityEngineering Center 
Tim Rains
Microsoft TrustworthyComputing
Mark E. Russinovich
Microsoft Technical Fellow
Weijuan Shi
Windows Business Group
Adam Shostack 
Microsoft TrustworthyComputing
Frank Simorjay
Microsoft TrustworthyComputing
Hemanth Srinivasan
Microsoft Malware ProtectionCenter 
Holly Stewart
Microsoft Malware ProtectionCenter 
 
Matt Thomlinson
Microsoft Security ResponseCenter 
 Jeff Williams
Microsoft Malware ProtectionCenter 
Scott Wu
Microsoft Malware ProtectionCenter 
Terry Zink
 Microsoft Forefront OnlineProtection for Exchange
Contributors
Roger Capriotti
Windows Live SafetyPlatform
Doug Cavit
Microsoft TrustworthyComputing
CSS Japan SecurityResponse Team
Microsoft Japan
Dave Forstrom
Microsoft TrustworthyComputing
Eric Foster
Windows Live SafetyPlatform
Enrique Gonzalez
Microsoft Malware ProtectionCenter 
Heather Goudey
Microsoft Malware ProtectionCenter 
Vinny Gullotto
Microsoft TrustworthyComputing
Satomi Hayakawa
CSS Japan Security ResponseTeam
Forbes Higman
Windows Live SafetyPlatform
 Yuhui Huang
Microsoft Malware ProtectionCenter 
Aaron Hulett
Microsoft Malware ProtectionCenter 
Hilda Larina Ragragio
Microsoft Malware ProtectionCenter 
 
Eric Lawrence
Windows Live SafetyPlatform
Ken Malcolmson
Microsoft TrustworthyComputing
Takumi Onodera
Microsoft Premier FieldEngineering, Japan
Daryl Pecelj
Microsoft IT InformationSecurity and RiskManagement
Kathy Phillips
Microsoft Legal andCorporate Affairs
Tareq Saade
Microsoft Malware ProtectionCenter 
Richard Saunders
Microsoft TrustworthyComputing
 Jasmine Sesso
Microsoft Malware ProtectionCenter 
Norie Tamura
CSS Japan Security ResponseTeam
Matt Thomlinson
Microsoft TrustworthyComputing
Patrik Vicol
Microsoft Malware ProtectionCenter 
Steve Wacker
Wadeware LLC 

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->