Pop-Up Thingie

Digital Distortion
  • Home
  • Forum
  • Files
  • Web Monitor
  • Log in

  1. Forum
  2. League10
  3. Microsoft Sec. Bulletin
  • Microsoft Security Newsletter - January 2014

    From Lord Time@TIME to All on Wed Jan 29 09:48:48 2014
    Microsoft Security Newsletter - January 2014



    Trustworthy Computing | January 2014
    Microsoft Security Newsletter



    Welcome to January’s Security Newsletter!


    We thought we would kick off the new year by providing you with insight into our "Top Cyber Threat Predictions for 2014."This is a topic that continues to garner interest by security professionals and something we thought you all might enjoy. Below are the top predictions for 2014 provided by a wide-range of senior cybersecurity leaders at Microsoft:


    -
    Prediction #1:Cybersecurity Regulatory Efforts Will Spark Greater Need for Harmonization


    -
    Prediction #2:Service-Impacting Interruptions for Online Services Will Persist


    -
    Prediction #3:We Will See an Increase in Cybercrime Activity Related to the World Cup


    -
    Prediction #4:Rise of Regional Cloud Services


    -
    Prediction #5:Dev-Ops Security Integration Fast Becoming Critical


    -
    Prediction #6:Cybercrime that Leverages Unsupported Software will Increase


    -
    Prediction #7:Increase in Social Engineering


    -
    Prediction #8:Ransomware will Impact More People



    More information on each of these predictions can be found in the http://blogs.technet.com/b/security/archive/2013/12/12/security-professionals-t op-threat-predictions-for-2014.aspx
    Microsoft Security Blog . To summarize, we have seen some significant shifts in the threat landscape and in the industry in 2013, but basic security fundamentals continue to be effective at mitigating the risks. Keeping all software up to date, running anti-malware software from a trusted source, and demanding that the software you use has been developed using a security development lifecycle will continue to be best practices in 2014. Leveraging cloud services will also pay security, privacy and reliability dividends in the new year and beyond.



    This month’s newsletter features the top tools and resources to help you protect yourself, your organization, and your customers against some of the threats outlined in these predictions. I hope you find this information helpful and wish you all a happy new year.



    Best regards,

    Tim Rains, Director

    Microsoft
    Trustworthy
    Computing



    Have feedback on how we can improve this newsletter? Email us at mailto:secnlfb@microsoft.com
    secnlfb@microsoft.com and share your ideas.



    Top Stories



    http://blogs.technet.com/b/trustworthycomputing/archive/2014/01/08/suggested-re solutions-for-cloud-providers-in-2014-1-reinforce-that-security-is-a-shared-res ponsibility.aspx
    Suggested Resolutions for Cloud Providers in 2014: Reinforce that Security is a Shared Responsibility

    When an organization is moving to the cloud, everyone has a role to play when it comes to security. Learn why this is an important new year’s resolution for both cloud providers and their customers in this blog post from Adrienne Hall, General Manager of Microsoft Trustworthy Computing, then explore other suggested resolutions around

    http://blogs.technet.com/b/trustworthycomputing/archive/2014/01/10/suggested-re solutions-for-cloud-providers-in-2014-2-be-precise-about-what-the-service-does- and-doesn-t-do.aspx
    clearly defining what a cloud service does (and doesn’t) do and

    http://blogs.technet.com/b/trustworthycomputing/archive/2014/01/14/suggested-re solutions-for-cloud-providers-in-2014-3-avoid-acronym-soup-when-discussing-clou d-services.aspx
    avoiding acronyms when discussing cloud services.


    http://blogs.technet.com/b/security/archive/2014/01/16/the-cybersecurity-risk-p aradox-measuring-the-impact-of-social-economic-and-technological-factors-on-cyb ersecurity.aspx
    The Cybersecurity Risk Paradox

    http://download.microsoft.com/download/E/1/8/E18A8FBB-7BA6-48BD-97D2-9CD32A71B4 34/Cybersecurity-Risk-Paradox.pdf
    Download a new report on the impact of social, economic, and technological factors on cybersecurity. This special edition of the Microsoft Security Intelligence Report outlines the challenges in developing countries and offers policy recommendations.


    http://blogs.technet.com/b/security/
    Drive-by Download Attacks: Examining the Web Server Platforms Attackers Use Most Often

    Drive-by download attacks continue to be many attacker’s favorite type of attack. A drive-by download site is a website that hosts one or more exploits that target vulnerabilities in web browsers and browser add-ons. Users with vulnerable computers can be infected with malware simply by visiting such a website, even without attempting to download anything. Explore this trend in more detail and learn how developers and IT pros can take action to manage the risks associated with this type of attack.




    Security Guidance



    http://blogs.technet.com/b/trustworthycomputing/archive/2013/12/29/translating- geek-speak-into-executive-speak.aspx
    Security Tip of the Month: Translate "Geek Speak" into "Executive Speak"

    For business leaders and decision makers, it has never been more important to have a regular, open dialogue about security with IT staff. Learn why security professionals should learn to translate "geek speak" into "executive speak" to ensure that their concerns and recommendations are heard.


    http://www.microsoft.com/download/details.aspx?id=10985
    A Guide to Data Governance for Privacy, Confidentiality, and Compliance

    Data governance is an approach that public and private entities can use to organize one or more aspects of their data management efforts, including business intelligence (BI), data security and privacy, master data management (MDM), and data quality (DQ) management. This series of guides aims to answer key questions about how to approach the combined challenges of information security and privacy and the associated regulatory compliance obligations.


    http://www.microsoft.com/download/details.aspx?id=16048
    Privacy Guidelines for Developing Software Products and Services

    As the threat landscape escalates, customers are feeling less able to control access to their personal information. As a result, Microsoft has developed a set of privacy guidelines for developing software products and services based on its internal guidelines to help you incorporate privacy into your own development process.


    http://www.microsoft.com/download/details.aspx?id=38823
    Resilience by Design for Cloud Services

    Learn about Resiliency Modeling and Analysis (RMA), a methodology for improving resiliency adapted from the industry-standard technique known as Failure Mode and Effects Analysis (FMEA), and get guidance for incorporating robust resilience design into the development cycle.


    http://www.microsoft.com/download/details.aspx?id=35843
    Deploying Highly Available and Secure Cloud Solutions

    Explore the key principles cloud providers should consider when developing and deploying cloud services and get real-world examples of deploying robust cloud solutions to maintain highly available and secure client connections.


    http://technet.microsoft.com/security/jj923069.aspx
    How to Mitigate Against Targeted Cyber Intrusion

    Sensitive information, corporate intellectual property, financial information, and private personal data is being lost to cyber intrusions targeted at government agencies and private enterprises. Explore some effective protections that you can put in place without a new investment in technology or personnel.


    http://www.microsoft.com/download/details.aspx?id=29855
    The Compliance Benefits of Better Application Security

    At first glance, the overlap between compliance and software security is limited to the specific software security requirements posed in standards such as the Payment Application Data Security Standard (PA DSS). In practice however, software security and IT compliance are deeply intertwined. This paper explains why.


    http://technet.microsoft.com/security/dn194322.aspx
    End User Education in the Real World

    Learn some valuable tips to employ when educating your users about security and privacy, and find out how to create an effective security awareness program. Looking for resources to help you explain social engineering and ransomware to your end users? Check out the Microsoft Safety & Security Center’s

    http://www.microsoft.com/security/online-privacy/email.aspx
    email and social networking resources and

    http://www.microsoft.com/security/resources/ransomware-whatis.aspx
    What is ransomware? . For additional guidance for your organization, see

    http://www.microsoft.com/download/details.aspx?id=19520
    How to Protect Insiders from Social Engineering Threats .




    This Month's Security Bulletins


    January 2014 Security Bulletins


    Important

    -MS14-001:2916605 https://technet.microsoft.com/en-us/security/bulletin/MS14-001

    Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution

    -MS14-002:2914368 https://technet.microsoft.com/en-us/security/bulletin/MS14-002

    Vulnerability in Windows Kernel Could Allow Elevation of Privilege

    -MS14-003:2913602 https://technet.microsoft.com/en-us/security/bulletin/MS14-003

    Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege


    -MS14-004:2880826 https://technet.microsoft.com/en-us/security/bulletin/MS14-004

    Vulnerability in Microsoft Dynamics AX Could Allow Denial of Service


    January 2014 Security Bulletin Resources:

    - http://blogs.technet.com/b/msrc/archive/2014/01/14/a-look-into-the-future-and-t he-january-2014-bulletin-release.aspx

    Microsoft Security Response Center (MSRC) Blog Post

    -
    http://www.youtube.com/watch?v=Qbiw-P6JWyo
    Security Bulletin Webcast

    -
    http://blogs.technet.com/b/msrc/p/january-2014-security-bulletin-q-a.aspx

    Security Bulletin Webcast Q&A



    Security Events and Training



    https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032572879 Microsoft Webcast: Information about the February 2014 Security Bulletin Release
    Wednesday, February 12, 2014 – 11:00AM Pacific Time

    Join this webcast for a brief overview of the technical details of February’s Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.


    http://www.rsaconference.com/events/us14/agenda/sessions/1055/a-deep-dive-into- the-security-threat-landscape-of
    RSA Conference Session: A Deep Dive into the Security Threat Landscape of the Middle East
    Wednesday, February 26, 2014 – 8:00AM Pacific Time, Moscone Center (West, Room 3002), San Francisco, CA

    The Middle East has seen a number of high profile targeted attacks in the past few years. If you are attending the RSA Conference this year, be sure to join Microsoft TwC Director Tim Rains for this session as he takes a closer a look at the security threat landscape in several Middle Eastern countries, including Egypt, Iraq, Qatar and Saudi Arabia.


    https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032571237 Microsoft Cloud Services – Taking Any App to the Cloud
    Wednesday, March 5, 2014 – 10:00AM Pacific Time

    Migrating business to the cloud isn’t just a trend anymore, but rather a fundamental business requirement. Learn how the Windows Azure Platform-as-a-Service (PaaS) strategy can help you build and run custom enterprise-grade applications as services with near-infinite scalability and security.


    https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032572977 Microsoft Webcast: Information about the March 2014 Security Bulletin Release Wednesday, March 12, 2014 – 11:00AM Pacific Time

    Join this webcast for a brief overview of the technical details of March’s Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.


    https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032575681
    MTC LIVE Atlanta Presents – Identity and Security in the Cloud
    Thursday, March 27, 2014 – 3:00PM Eastern Time

    How do you keep your users mobile and productive while ensuring that your organization’s data and resources are safe? Join this live, interactive session to learn how to: provide access and information protection that allows you to control access to corporate data and resources while offering a seamless end-user authentication experience; manage and federate user identities across the organization and into the cloud in order to provide employees appropriate access to the needed resources; and provide secure and always-available remote access capabilities to ensure corporate resources can be reached from anywhere and yet still controlled and protected.


    http://northamerica.msteched.com/
    TechEd North America 2014
    May 12-15, 2014 – Houston, Texas

    In 2014, Microsoft is bringing together the best of TechEd and the Microsoft Management Summit (MMS) to help skilled technology professionals increase their technical expertise, share best practices, and interaction with Microsoft and a variety of industry experts and their peers. Explore the security aspects of data platforms and business intelligence, datacenter and infrastructure management, people-centric IT, Windows (devices and Windows Phone), and much more.

    http://northamerica.msteched.com/Register
    Register today .






    Essential Tools


    -
    http://technet.microsoft.com/security/bulletin
    Microsoft Security Bulletins

    -
    http://technet.microsoft.com/security/advisory
    Microsoft Security Advisories

    -
    http://technet.microsoft.com/solutionaccelerators/cc835245.aspx
    Security Compliance Manager

    -
    http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
    Microsoft Security Development Lifecycle Starter Kit

    -
    http://support.microsoft.com/kb/2458544
    Enhanced Mitigation Experience Toolkit

    -
    http://www.microsoft.com/security/pc-security/malware-removal.aspx
    Malicious Software Removal Tool

    -
    http://technet.microsoft.com/security/cc184924.aspx
    Microsoft Baseline Security Analyzer


    Security Centers


    -
    http://technet.microsoft.com/security
    Security TechCenter

    -
    http://msdn.microsoft.com/security
    Security Developer Center

    -
    http://www.microsoft.com/security/msrc/default.aspx
    Microsoft Security Response Center

    -
    http://www.microsoft.com/security/portal/
    Microsoft Malware Protection Center

    -
    http://www.microsoft.com/privacy
    Microsoft Privacy

    -
    http://support.microsoft.com/select/default.aspx?target=hub&c1=10750
    Microsoft Security Product Solution Centers


    Additional Resources


    -
    http://www.microsoft.com/about/twc/en/us/blogs.aspx
    Trustworthy Computing Security and Privacy Blogs

    -
    http://www.microsoft.com/security/sir
    Microsoft Security Intelligence Report

    -
    http://www.microsoft.com/security/sdl
    Microsoft Security Development Lifecycle

    -
    http://technet.microsoft.com/library/cc162838.aspx
    Malware Response Guide

    -
    http://technet.microsoft.com/security/bb980617.aspx
    Security Troubleshooting and Support Resources

    -
    http://www.microsoft-careers.com/go/Trustworthy-Computing-Jobs/194701/ Trustworthy Computing Careers




    microsoft.com/about/twcTrustworthy Computing




    This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.



    (c) 2014 Microsoft Corporation

    http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Copyright/defau lt.aspx
    Terms of Use |

    http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Trademarks/EN-U S.aspx
    Trademarks


    Microsoft respects your privacy. To learn more please read our online http://go.microsoft.com/fwlink/?LinkId=248681
    Privacy Statement .



    If you would prefer to no longer receive this newsletter, please http://pages.email.microsoftemail.com/page.aspx?QS=38dfbe491fab00ea380afe73db21 804e1836ec2291e123ed&emailid=282324&memberid=10030559&jobid=2739841&listid=8857 87&listname=Subscription_10030559_1109&subscriberkey=lordtime@tds.net&emailaddr =lordtime@tds.net&subscriberid=328026660
    click here .



    To set your contact preferences for other Microsoft communications http://click.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b 6311d344a0079e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31 618dc8d7baee8bb726dfab1eabd773d2ca0ced7483bd75dadb8ad6720bda1a27ac17e8
    click here


    Microsoft Corporation

    One Microsoft Way

    Redmond, WA 98052 USA



    ---
    ■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games
  • Web-based telnet client

    Other Links
    What is a BBS?
    Doors installed on this BBS
    Digital Distortion Doors & Tools
    Door stats
    Trivia scores
    Message networks
    Terminal software
    Synchronet archiver setup
    Ready.gov anti-terrorist guidelines as of 2003

    Other services
    Telnet
    RLogin
    IRC
    Email & news access

    Feel free to send me an email.

    BBS UPS stats
  • Who's Online

  • Recent Visitors

    • Merlin
      Mon Apr 14 06:31:48 2025
      from Milton, WV via HTTP
    • Merlin
      Sun Apr 6 09:19:55 2025
      from Milton, WV via HTTP
    • xbit
      Sat Feb 22 04:36:09 2025
      from Portland, Or via HTTP
    • Wilmaxs
      Wed Aug 16 04:20:48 2023
      via HTTP
  • System Info

    Sysop: Eric Oulashin
    Location: Beaverton, Oregon, USA
    Users: 100
    Nodes: 16 (0 / 16)
    Uptime: 02:04:26
    Calls: 6,165
    Calls today: 1
    Files: 8,500
    D/L today: 127 files
    (44,444K bytes)
    Messages: 348,919

© Digital Distortion, 2025