Pop-Up Thingie

Digital Distortion
  • Home
  • Forum
  • Files
  • Web Monitor
  • Log in

  1. Forum
  2. League10
  3. Microsoft Sec. Bulletin
  • Microsoft Security Newsletter - November 2013

    From Lord Time@TIME to All on Wed Nov 27 08:26:27 2013
    Microsoft Security Newsletter - November 2013



    Trustworthy Computing | November 2013
    Microsoft Security Newsletter



    Welcome to November’s Security Newsletter!

    This month our newsletter focuses on the top threats facing enterprise organizations. Many of the customers I talk with around the world are faced with increased business complexities combined with resource and financial constraints and are interested in learning how to prioritize their security investments to manage security risk. One of the key inputs to help prioritize security risk is threat intelligence. A few weeks ago, we published volume 15 of the

    http://www.microsoft.com/sir
    Microsoft Security Intelligence Report (SIR) . In the report, we list out the top 10 threats facing enterprises. Based on our research, enterprises encounter malware via three primary avenues: a) malicious or compromised websites, worms that spread through networked drives, and autorun feature abuse; b) weak passwords; or c) social engineering.



    By the end of 2012, web-based attacks had surpassed traditional network worms to become the top threats facing enterprises and the latest SIR shows that this trend is continuing. In fact, during the second quarter of 2013, six out of the top 10 threats facing enterprises were associated with malicious or compromised websites. While web-based attacks have become the most common threats facing enterprises, worms cannot be ignored. In the second quarter of 2013 three out of the top ten threats facing enterprises were associated with worms. The third most common way in which enterprise organizations are encountering malware based on the latest threat intelligence is through social engineering.



    The good news is that there are effective mitigations and best practices that can be used to help protect your enterprise such as keeping all software up to date, running software that was developed with a security development lifecycle, restricting web browsing, managing the security of your websites, and leveraging network security technologies. If you are interested in learning more about the top threats facing enterprises and how to take action, I encourage you to check out our recent blog post entitled, "

    http://blogs.technet.com/b/security/archive/2013/11/25/microsoft-cybersecurity- report-top-10-most-wanted-enterprise-threats.aspx
    Microsoft Cybersecurity Report: Top 10 Most Wanted Enterprise Threats ."



    Of course, this is just one of many key takeaways from the latest SIR. To download the complete report, which includes regional threat intelligence for 106 locations around the world, visit

    http://www.microsoft.com/sir
    www.microsoft.com/sir . We hope you enjoy it and encourage you to provide feedback to our Twitter handle

    https://twitter.com/msftsecurity
    @MSFTSecurity .



    Best regards,

    Tim Rains, Director

    Microsoft
    Trustworthy
    Computing



    Have feedback on how we can improve this newsletter? Email us at mailto:secnlfb@microsoft.com
    secnlfb@microsoft.com and share your ideas.



    Top Stories



    http://blogs.technet.com/b/srd/archive/2013/11/12/introducing-enhanced-mitigati on-experience-toolkit-emet-4-1.aspx
    Enhanced Mitigation Experience Toolkit 4.1 Released

    The Enhanced Mitigation Experience Toolkit (EMET) helps prevent attackers from gaining access to computers, works well in the enterprise, and protects across a wide range of scenarios. Now available for download,

    http://www.microsoft.com/download/details.aspx?id=41138
    EMET 4.1 includes updates that simplify configuration and enable faster deployment.


    http://blogs.technet.com/b/security/archive/2013/11/07/maslow-and-malware-devel oping-a-hierarchy-of-needs-for-cybersecurity.aspx
    Maslow and Malware: Developing a Hierarchy of Needs for Cybersecurity

    Pervasive use of computing and the Internet means that companies need plans in place to ensure key assets, systems and networks remain protected, while preserving the benefits that come with broad connectivity. As approaches vary country to country, Microsoft recently partnered with Oxford-Analytica to develop a

    http://download.microsoft.com/download/E/6/2/E62530BF-47CC-4527-88BA-F13DF5294A 65/HierarchyofCybersecurityNeeds.pdf
    downloadable report that looks at how organizations can seek to maximize the benefits of the Internet by matching their cybersecurity priorities to the needs of their citizens.




    Security Guidance



    http://technet.microsoft.com/security/dn535790.aspx
    Ransomware in the Enterprise
    Marianne Mallen (Antivirus Researcher), Vidya Sekhar (Program Manager), Ben Hope (Technical Writer) – http://www.microsoft.com/security/portal/mmpc/default.aspx
    Microsoft Malware Protection Center

    One problem affecting the enterprise space is ransomware, a type of malware designed to render a computer or its files unusable until you pay a certain amount of money to the attacker. Learn more about this threat and how to deal with a ransomware infection. For additional tips on how to protect your organization, see

    http://blogs.technet.com/b/trustworthycomputing/archive/2013/11/19/ransomware-w ays-to-protect-yourself-amp-your-business.aspx
    Ransomware: Ways to Protect Yourself & Your Business .


    http://technet.microsoft.com/security/dn535789.aspx
    Security Keeps the Money Flowing: A Framework for Data Loss Prevention

    http://mvp.microsoft.com/en-us/mvp/Dan Griffin-4024470
    Dan Griffin , Microsoft MVP – Enterprise Security and Founder of JW Secure, Inc.

    The importance of protecting sensitive or important data is paramount for any business. While security technology today is amazingly advanced, so is the motivation and sophistication of the threat landscape. Explore a framework that can help you better evaluate data loss prevention (DLP) technologies for your organization.


    http://technet.microsoft.com/library/cc162838.aspx
    Malware Response Guide

    Download the Infrastructure Planning and Design Guide for Malware Response for help with planning the best and most cost-effective response to malicious software for your organization. This free guide provides methodologies for the assessment of malware incidents, walks through the considerations and decisions that are pertinent to timely response and recovery, and describes approaches to investigating outbreaks and cleaning infected systems.


    http://technet.microsoft.com/en-us/library/exchange-online-antispam-and-antimal ware-protection.aspx
    Anti-Spam and Anti-Malware Protection with Exchange Online

    Microsoft Exchange Online provides built-in malware and spam filtering capabilities that help protect inbound and outbound messages from malicious software and help protect your network from spam transferred through email. Explore the filtering technologies enabled by default, then learn how to configure and customize

    http://technet.microsoft.com/library/jj200745.aspx
    anti-malware policies and

    http://technet.microsoft.com/library/jj200687.aspx
    anti-spam policies .


    http://technet.microsoft.com/library/cc162838.aspx
    Malware Response Guide

    Download the Infrastructure Planning and Design Guide for Malware Response for help with planning the best and most cost-effective response to malicious software for your organization. This free guide provides methodologies for the assessment of malware incidents, walks through the considerations and decisions that are pertinent to timely response and recovery, and describes approaches to investigating outbreaks and cleaning infected systems.


    http://blogs.msdn.com/b/ie/archive/2012/03/14/enhanced-protected-mode.aspx Enhanced Protected Mode in Internet Explorer

    Learn how Enhanced Protected Mode, included in Internet Explorer 10 and Internet Explorer 11, helps keep your data safe even if an attacker has exploited a vulnerability in the browser or one of its add-ons. Looking for more technical details on this feature? Read

    http://blogs.msdn.com/b/ieinternals/archive/2012/03/23/understanding-ie10-enhan ced-protected-mode-network-security-addons-cookies-metro-desktop.aspx Understanding Enhanced Protected Mode .




    Cloud Security Corner



    http://social.technet.microsoft.com/wiki/contents/articles/6642.a-solution-for- private-cloud-security.aspx
    A Solution for Private Cloud Security

    With increasing numbers of organizations looking to create cloud-based environments or implement cloud technologies within their existing data centers, business and technology decision-makers are looking closely at the possibilities and practicalities that these changes involve. Get a comprehensive explanation of the process for designing and running security for a private cloud environment.




    This Month's Security Bulletins


    November 2013 Security Bulletins


    Critical

    -MS13-088:2888505 https://technet.microsoft.com/en-us/security/bulletin/ms13-088

    Cumulative Security Update for Internet Explorer

    -MS13-089:2876331 https://technet.microsoft.com/en-us/security/bulletin/ms13-089

    Vulnerability in Windows Graphics Device Interface Could Allow Remote Code Execution

    -MS13-090:2900986 https://technet.microsoft.com/en-us/security/bulletin/ms13-090

    Cumulative Security Update of ActiveX Kill Bits


    Important

    -MS13-091:2885093 https://technet.microsoft.com/en-us/security/bulletin/ms13-091

    Vulnerabilities in Microsoft Office Could Allow Remote Code Execution

    -MS13-092:2893986 https://technet.microsoft.com/en-us/security/bulletin/ms13-092

    Vulnerability in Hyper-V Could Allow Elevation of Privilege

    -MS13-093:2875783 https://technet.microsoft.com/en-us/security/bulletin/ms13-093

    Vulnerability in Windows Ancillary Function Driver Could Allow Information Disclosure

    -MS13-094:2894514 https://technet.microsoft.com/en-us/security/bulletin/ms13-094

    Vulnerability in Microsoft Outlook Could Allow Information Disclosure

    -MS13-095:2868626 https://technet.microsoft.com/en-us/security/bulletin/ms13-095

    Vulnerability in Digital Signatures Could Allow Denial of Service


    November 2013 Security Bulletin Resources:

    - hhttp://blogs.technet.com/b/msrc/archive/2013/11/12/authenticity-and-the-novemb er-2013-security-updates.aspx

    Microsoft Security Response Center (MSRC) Blog Post

    -
    http://youtu.be/KqVpF7QqFj0
    Security Bulletin Webcast (MP4)

    -
    http://blogs.technet.com/b/msrc/p/november-2013-security-bulletin-q-a.aspx

    Security Bulletin Webcast Q&A



    Security Events and Training



    https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032557386 Microsoft Webcast: Information about the December 2013 Security Bulletin Release
    Wednesday, December 11, 2013

    Join this webcast for a brief overview of the technical details of December’s Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.


    https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032571337 Microsoft’s New Windows RMS – Advanced Information Protection Tuesday, December 17, 2013

    Learn about the major updates to Microsoft's new Rights Management Services that can provide support for non-Microsoft file formats on multiple platforms including iOS and Android, and extend those capabilities beyond your organization to business partners and individuals.






    Essential Tools


    -
    http://technet.microsoft.com/security/bulletin
    Microsoft Security Bulletins

    -
    http://technet.microsoft.com/security/advisory
    Microsoft Security Advisories

    -
    http://technet.microsoft.com/solutionaccelerators/cc835245.aspx
    Security Compliance Manager

    -
    http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
    Microsoft Security Development Lifecycle Starter Kit

    -
    http://support.microsoft.com/kb/2458544
    Enhanced Mitigation Experience Toolkit

    -
    http://www.microsoft.com/security/pc-security/malware-removal.aspx
    Malicious Software Removal Tool

    -
    http://technet.microsoft.com/security/cc184924.aspx
    Microsoft Baseline Security Analyzer


    Security Centers


    -
    http://technet.microsoft.com/security
    Security TechCenter

    -
    http://msdn.microsoft.com/security
    Security Developer Center

    -
    http://www.microsoft.com/security/msrc/default.aspx
    Microsoft Security Response Center

    -
    http://www.microsoft.com/security/portal/
    Microsoft Malware Protection Center

    -
    http://www.microsoft.com/privacy
    Microsoft Privacy

    -
    http://support.microsoft.com/select/default.aspx?target=hub&c1=10750
    Microsoft Security Product Solution Centers


    Additional Resources


    -
    http://www.microsoft.com/about/twc/en/us/blogs.aspx
    Trustworthy Computing Security and Privacy Blogs

    -
    http://www.microsoft.com/security/sir
    Microsoft Security Intelligence Report

    -
    http://www.microsoft.com/security/sdl
    Microsoft Security Development Lifecycle

    -
    http://technet.microsoft.com/library/cc162838.aspx
    Malware Response Guide

    -
    http://technet.microsoft.com/security/bb980617.aspx
    Security Troubleshooting and Support Resources

    -
    http://www.microsoft-careers.com/go/Trustworthy-Computing-Jobs/194701/ Trustworthy Computing Careers




    microsoft.com/about/twcTrustworthy Computing




    This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.



    (c) 2013 Microsoft Corporation. All rights reserved. Microsoft, MSDN, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.



    Microsoft respects your privacy. To learn more please read our online http://go.microsoft.com/fwlink/?LinkId=81184
    Privacy Statement .



    If you would prefer to no longer receive this newsletter, please http://pages.email.microsoftemail.com/page.aspx?QS=38dfbe491fab00ea380afe73db21 804e1836ec2291e123ed&emailid=277421&memberid=10030559&jobid=2676516&listid=8857 87&listname=Subscription_10030559_1109&subscriberkey=lordtime@tds.net&emailaddr =lordtime@tds.net&subscriberid=328026660
    click here .



    To set your contact preferences for other Microsoft communications http://click.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b 6311d344a0079e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31 618dc832abaeba02aa2e4e965d8d2c8b9ab62f098fb9b896acf91a323dcc1b9b83813d
    click here .



    Microsoft Corporation

    One Microsoft Way

    Redmond, WA 98052 USA






    ---
    ■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games
  • Web-based telnet client

    Other Links
    What is a BBS?
    Doors installed on this BBS
    Digital Distortion Doors & Tools
    Door stats
    Trivia scores
    Message networks
    Terminal software
    Synchronet archiver setup
    Ready.gov anti-terrorist guidelines as of 2003

    Other services
    Telnet
    RLogin
    IRC
    Email & news access

    Feel free to send me an email.

    BBS UPS stats
  • Who's Online

  • Recent Visitors

    • Merlin
      Mon Apr 14 06:31:48 2025
      from Milton, WV via HTTP
    • Merlin
      Sun Apr 6 09:19:55 2025
      from Milton, WV via HTTP
    • xbit
      Sat Feb 22 04:36:09 2025
      from Portland, Or via HTTP
    • Wilmaxs
      Wed Aug 16 04:20:48 2023
      via HTTP
  • System Info

    Sysop: Eric Oulashin
    Location: Beaverton, Oregon, USA
    Users: 101
    Nodes: 16 (0 / 16)
    Uptime: 22:50:39
    Calls: 6,163
    Calls today: 7
    Files: 8,500
    D/L today: 6,824 files
    (2,692M bytes)
    Messages: 348,693
    Posted today: 2

© Digital Distortion, 2025