19 agosto 2008
Developer Highway Code (free ebook)
Pubblicato da Francesco Passantino - martedì, agosto 19, 2008 0 commentiThese security engineering activities have been developed by Microsoft patterns & practices to build on, refine and extend core lifecycle activities with a set of security-specific activities. These include identifying security objectives, applying design guidelines for security, threat modelling, security architecture and design reviews, security code reviews and security deployment reviews.
19 luglio 2008
How Cybercriminals Steal Money
Pubblicato da Francesco Passantino - sabato, luglio 19, 2008 0 commenti02 luglio 2008
ratproxy
Pubblicato da Francesco Passantino - mercoledì, luglio 02, 2008 0 commentiDetects and prioritizes broad classes of security problems, such as dynamic cross-site trust model considerations, script inclusion issues, content serving problems, insufficient XSRF and XSS defenses, and much more.
Ratproxy is currently believed to support Linux, FreeBSD, MacOS X, and Windows (Cygwin) environments.
09 giugno 2008
Microsoft Security Compliance Management toolkit
Pubblicato da Francesco Passantino - lunedì, giugno 09, 2008 0 commentiIn today’s IT environment, the ability to comply with regulations and industry standards, such as the Sarbanes Oxley Act, is a source of deep concern for many organizations. In addition, organizations need to manage risks resulting from emerging threats and changing conditions within their IT infrastructures. As a result, organizations need sound methods that they can count on to understand the state of the security settings in their IT infrastructures, assess the compliance of a security baseline, and demonstrate that compliance requirements have been met.
To help organizations address these challenges, Microsoft has created the Security Compliance Management toolkit. The toolkit provides best practices from Microsoft about how to plan, deploy, and monitor a security baseline. In addition, the toolkit provides remediation recommendations to address security baseline issues. The toolkit also offers a proven method that your organization can use to effectively monitor the compliance state of recommended security baselines for Windows Vista®, Windows® XP Service Pack 2 (SP2), and Windows Server® 2003 SP2.
23 aprile 2008
Microsoft Security Intelligence Report
Pubblicato da Francesco Passantino - mercoledì, aprile 23, 2008 0 commenti19 febbraio 2008
Microsoft Security Assessment Tool 3.5
Pubblicato da Francesco Passantino - martedì, febbraio 19, 2008 0 commentiIl tool adotta un approccio olistico che permette di valutare il livello di sicurezza dell’organizzazione esaminandola dal punto di vista delle persone, dei processi e delle tecnologie. I risultati vengono poi confrontati con delle guide di riferimento e con suggerimenti per la mitigazione del rischio fornendo anche collegamenti e informazioni ad approfondimenti per singolo settore di industria.
Queste risorse possono essere di aiuto nell’identificare strumenti e metodi specifici che possano cambiare l’approccio alla sicurezza dell’ambiente IT.
12 febbraio 2008
All Your iFrame Are Point to Us
Pubblicato da Francesco Passantino - martedì, febbraio 12, 2008 0 commentiIt has been over a year and a half since we started to identify web pages that infect vulnerable hosts via drive-by downloads, i.e. web pages that attempt to exploit their visitors by installing and running malware automatically. During that time we have investigated billions of URLs and found more than three million unique URLs on over 180,000 web sites automatically installing malware. During the course of our research, we have investigated not only the prevalence of drive-by downloads but also how users are being exposed to malware and how it is being distributed. Our research paper is currently under peer review, but we are making a technical report [PDF] available now. Although our technical report contains a lot more detail, we present some high-level findings here: