Skip to content

Microsoft Secure

Microsoft vs. the botnets

A botnet is a network of “zombie” computers infected with malware that enables cybercriminals to commit undetected fraud and other harmful acts. To help disrupt an emerging botnet, the Microsoft Digital Crimes Unit (DCU) recently took legal action against cybercriminals who were responsible for distributing 500 different strains of malware with the potential for targeting...

Read more

Microsoft’s Free Security Tools – A Deeper Look at XSS Attacks and Microsoft’s free Anti-Cross-Site Scripting Library

This article in our free security tools series focuses on the benefits of the Microsoft Anti-Cross-site Scripting Library (Anti-XSS).  Cross-site scripting (XSS) is an attack technique in which an attacker inserts malicious HTML and JavaScript into a vulnerable webpage, often in an effort to distribute malware or to steal sensitive information from the website or...

Read more

Designing for High Availability in the Cloud

Three key objectives of information security are to maintain the confidentiality, integrity and availability of an organization’s information. Most of the conversations I have with security professionals seem to revolve around the confidentiality and integrity of data.  The topic of availability is typically broached only in discussions regarding DDOS attacks or Hackvitism.  But more and...

Read more

Time to [Wo]man Up: Get Girls Excited About Science & Technology

Fewer than 15 percent of U.S. undergraduates are pursuing degrees in science and engineering.  U.S. math and science test scores lag those of other nations, chiefly China and India.  U.S. high schools are falling behind the rest of the world in computer science, and too few women and minorities are employed in science, technology, engineering...

Read more

Online fraud: Get practical advice

Need help spotting an online scam? Download our new free 12-page booklet called Online Fraud: Your Guide to Prevention, Detection, and Recovery. This guide includes: Real-world examples of false promises made in fake emails Images of scam emails to help you avoid them Tips for guarding your computer and your sensitive information   For more...

Read more