Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     
  OS Technical Updates [Page: 9 of 266] @ TACKtech Corp.  

12.18.2013 - MS13-075 - Important : Vulnerability in Microsoft Office IME (Chinese) Could Allow Elevation of Privilege (2878687) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (December 18, 2013): Clarified that only implementations of Microsoft Pinyin IME 2010 are affected by the vulnerability. However, this update may be offered to systems with a non-vulnerable IME. This helps to maintain consistency for shared files across Office products. For more information, see the Update FAQ.
Summary: This security update resolves a privately reported vulnerability in Microsoft Office IME (Chinese). The vulnerability could allow elevation of privilege if a logged on attacker launches Internet Explorer from the toolbar in Microsoft Pinyin IME for Simplified Chinese. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. Only implementations of Microsoft Pinyin IME 2010 are affected by this vulnerability. Other versions of Simplified Chinese IME and other implementations of IME are not affected.
Full View / NID: 46342 / Submitted by: The Zilla of Zuron

12.18.2013 - University of Colorado Health looks to Office 365 to improve collaboration



View Microsoft-Press related news.

REDMOND, Wash. — Dec . 1 8 , 2013 — In less than three months, the University of Colorado Health (UCHealth), a new healthcare system formed by Poudre Valley Health System, University of Colorado Hospital and Memorial Health System, and one of the largest healthcare providers in Colorado, has fully migrated 17,000 mailboxes from three disparate healthcare organizations on multiple legacy email platforms into one single consolidated Microsoft Office 365 environment. Switching to a complete Microsoft enterprise subscription solution is expected to increase collaboration across UCHealth and save an estimated $13.9 million in overall costs throughout an 11-year period.

“The healthcare industry is generally hesitant to use the cloud because of security and HIPAA concerns,” said Steve Hess, chief information officer for UCHealth. “However, Microsoft’s strong commitment to data security, privacy and compliance with HIPAA standards, coupled with its willingness to sign a comprehensive Business Associate Agreement for Office 365, gave us the confidence we needed to overcome our cloud anxieties.”

UCHealth’s strategy was to integrate its legacy IT solutions into single solutions including its enterprise resource planning, electronic health records and email systems. UCHealth looked at a variety of vendors, including Google, but ultimately chose Office 365 because of its functionality and usability, and because it supports HIPAA requirements beyond what other vendors provide. In addition, UCHealth determined that Microsoft Corp. was a more strategic partner for both its long- and short-term IT and collaboration needs.

“When we decided to go with a subscription model, we knew we needed enterprise-class capabilities that offered strong support for all our needs, including offline editing, deskless workers and mobile devices,” said Fernando Pedroza, UCHealth’s vice president of Technology Services.

Differentiators for Office 365 range from enabling telework to promoting internal communications and cross-collaboration. The reliability and flexibility that comes from enablement of remote and mobile employees through the Office 365 SharePoint and Lync components, as well as Microsoft’s separate Yammer social media solution, appealed to UCHealth. With more of the healthcare workforce being mobile, and given UCHealth’s geographic spread, it was important to have additional tools available for remote collaboration and communication throughout UCHealth’s network. Specifically, Microsoft Office 365 Lync is being used to host meetings, share desktop presentations, and find appropriate individuals and expertise quickly and effectively. Meanwhile, Microsoft Yammer is being used to share information and project statuses, find expertise quickly, and celebrate organizational successes.

“In many ways, the healthcare industry is just scratching the surface of the potential applications of collaboration and social media tools,” Hess said, “but it is powerful to see how these tools are being applied, how they can drive real value to our workforce, and ultimately, how they can improve the quality of care and value for our patients.”

More information about how organizations are turning to Microsoft technology is available on the Microsoft Customer Spotlight newsroom.

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Full View / NID: 46341 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-006 - Important : Vulnerability in Microsoft Windows Could Allow Security Feature Bypass (2785220) - Version: 1.3



View Microsoft related news. Severity Rating: Important
Revision Note: V1.3 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2785220). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes.
Full View / NID: 46340 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-050 - Important : Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege (2839894) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2839894). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability.
Full View / NID: 46331 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-039 - Important : Vulnerability in HTTP.sys Could Allow Denial of Service (2829254) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2829254). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a specially crafted HTTP packet to an affected Windows server or client.
Full View / NID: 46330 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-046 - Important : Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation Of Privilege (2840221) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2829361) and Windows RT (2830290). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves three reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs onto the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities.
Full View / NID: 46329 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-054 - Critical : Vulnerability in GDI+ Could Allow Remote Code Execution (2848295) - Version: 1.3



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.3 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2835361) and for Windows RT (2835364). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows, Microsoft Office, Microsoft Lync, and Microsoft Visual Studio. The vulnerability could allow remote code execution if a user views shared content that embeds TrueType font files.
Full View / NID: 46328 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-062 - Important : Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege (2849470) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2849470). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request.
Full View / NID: 46327 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-081 - Critical : Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2870008) - Version: 1.3



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.3 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2862335). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves seven privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user views shared content that embeds OpenType or TrueType font files. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system.
Full View / NID: 46326 / Submitted by: The Zilla of Zuron

12.12.2013 - Leading cloud service providers around the globe bet on Microsoft



View Microsoft-Press related news.

REDMOND , W ash. Dec. 12 , 2013 — On Thursday, Microsoft Corp. introduced the Cloud OS Network, a worldwide consortium of more than 25 cloud service providers delivering services built on the Microsoft Cloud Platform: Windows Server with Hyper-V, System Center and the Windows Azure Pack. These organizations support Microsoft’s Cloud OS vision of a consistent platform that spans customer datacenters, Windows Azure and service provider clouds. Service providers in the Cloud OS Network offer Microsoft-validated, cloud-based infrastructure and application solutions designed to meet customer needs.

“This network of leading service providers will help our customers create datacenters without boundaries for apps, data and device management,” said Takeshi Numoto, Microsoft corporate vice president of Cloud & Enterprise Marketing. “That translates into greater diversity of solutions, more flexibility and lower operational costs for customers, allowing them to focus on their core business rather than managing datacenters.” More comments from Numoto can be found on the Official Microsoft Blog.

Hybrid b enefits for c ustomers

Every organization has different needs and different IT requirements for addressing those needs. With the Cloud OS Network, customers now have even more choice in deploying hybrid solutions on the Microsoft Cloud Platform — either in their datacenter, in Windows Azure or, now, through a network of service providers. Customers also benefit from uniquely tailored, fully managed services within their local market, as well as a high degree of technical consistency across environments, which prevents vendor lock-in and enables flexibility. As a result, customers can focus on increasing efficiencies, improving employee productivity and lowering operational costs. Customers interested in the Cloud OS Network and the services offered by these partners can find additional information here.

Cloud s ervice p rovider o pportunity

As cloud adoption accelerates, service providers are focused on delivering value-added services to meet customer demand for hybrid cloud solutions. By joining Microsoft in the Cloud OS Network, leading cloud service providers can quickly and cost-effectively develop new services, attract new customers and increase revenues. With the Microsoft Cloud Platform, service providers have access to the capabilities of and best practices from Windows Azure.

“CSC continues to expand our strategic partnership with Microsoft to increase value to our clients and bring next-gen solutions to market,” said Marc Silvester, vice president of Offerings Management at CSC. “CSC and Microsoft continue to partner on offerings that leverage the tremendous growth in apps, devices and data that are driven by the rise of cloud computing. As these technologies play an ever-increasing role in business, CSC and Microsoft are working together to drive more efficiency and value through Microsoft’s Cloud OS vision. CSC is proud to be part of Microsoft’s Cloud OS Network.”

Watch what service providers have to say about Microsoft’s new Cloud OS Network here.

Worldwide r each

Organizations within the Cloud OS Network cover more than 90 active markets around the world, serve more than 3 million customers every day and operate over 2.4 million servers in more than 425 datacenters.

The Cloud OS Network
The Cloud OS Network
December 11, 2013

Downloads:
Web | Print


Partners in the Cloud OS Network include, among others, Alog, Aruba S.p.A., Capgemini, Capita IT Services, CGI, CSC, Dimension Data, DorukNet, Fujitsu Finland Oy., Fujitsu Ltd., iWeb, Lenovo, NTTX, Outsourcery, OVH.com, Revera, SingTel, Sogeti, TeleComputing, Tieto, Triple C Cloud Computing, T-Systems, VTC Digilink and Wortmann AG.

More details on today’s announcements can be found at the Microsoft News Center.

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Full View / NID: 46314 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-105 - Critical : Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2915705) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (December 10, 2013): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes".
Summary: This security update resolves three publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft Exchange Server. The most severe of these vulnerabilities exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. These vulnerabilities could allow remote code execution in the security context of the LocalService account if an attacker sends an email message containing a specially crafted file to a user on an affected Exchange server. The LocalService account has minimum privileges on the local system and presents anonymous credentials on the network.
Full View / NID: 46309 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-102 - Important : Vulnerability in LRPC Client Could Allow Elevation of Privilege (2898715) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted LPC port message to any LPC consumer or server. An attacker who successfully exploited the vulnerability could then install programs; view, change, or delete data; or create new accounts with full administrator rights. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.
Full View / NID: 46307 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-103 - Important : Vulnerability in ASP.NET SignalR Could Allow Elevation of Privilege (2905244) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in ASP.NET SignalR. The vulnerability could allow elevation of privilege if an attacker reflects specially crafted JavaScript back to the browser of a targeted user.
Full View / NID: 46306 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-104 - Important : Vulnerability in Microsoft Office Could Allow Information Disclosure (2909976) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves one privately reported vulnerability in Microsoft Office that could allow information disclosure if a user attempts to open an Office file hosted on a malicious website. An attacker who successfully exploited this vulnerability could ascertain access tokens used to authenticate the current user on a targeted SharePoint or other Microsoft Office server site.
Full View / NID: 46305 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-105 - Critical : Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2915705) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves three publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft Exchange Server. The most severe of these vulnerabilities exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. These vulnerabilities could allow remote code execution in the security context of the LocalService account if an attacker sends an email message containing a specially crafted file to a user on an affected Exchange server. The LocalService account has minimum privileges on the local system and presents anonymous credentials on the network.
Full View / NID: 46304 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-106 - Important : Vulnerability in a Microsoft Office Shared Component Could Allow Security Feature Bypass (2905238) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves one publicly disclosed vulnerability in a Microsoft Office shared component that is currently being exploited. The vulnerability could allow security feature bypass if a user views a specially crafted webpage in a web browser capable of instantiating COM components, such as Internet Explorer. In a web-browsing attack scenario, an attacker who successfully exploited this vulnerability could bypass the Address Space Layout Randomization (ASLR) security feature, which helps protect users from a broad class of vulnerabilities. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability that could take advantage of the ASLR bypass to run arbitrary code.
Full View / NID: 46303 / Submitted by: The Zilla of Zuron

12.09.2013 - Tech Company Coalition Supports Global Surveillance Principles, Calls on US to Lead Reform Efforts



View Microsoft-Press related news.

WASHINGTON, DC — Dec. 9, 2013 — Today AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter and Yahoo joined together to propose principles for reforming government surveillance laws and practices. The companies also urged the President and the United States Congress to take the lead on reform with an open letter that reads:

Dear Mr. President and Members of Congress,

We understand that governments have a duty to protect their citizens. But this summer’s

revelations highlighted the urgent need to reform government surveillance practices worldwide. The balance in many countries has tipped too far in favor of the state and away from the rights of the individual­­rights that are enshrined in our Constitution. This undermines the freedoms we all cherish. It’s time for change.

For our part, we are focused on keeping users’ data secure­­deploying the latest encryption technology to prevent unauthorized surveillance on our networks, and by pushing back on government requests to ensure that they are legal and reasonable in scope.

We urge the US to take the lead and make reforms that ensure that government surveillance efforts are clearly restricted by law, proportionate to the risks, transparent and subject to independent oversight. To see the full set of principles we support, visit www.reformgovernmentsurveillance.com.

AOL Apple Facebook Google LinkedIn Microsoft Twitter Yahoo

Company executives also provided statements on the principles of reform:

“AOL is committed to preserving the privacy of our customers' information, while respecting the right of governments to request information on specific users for lawful purposes. AOL is proud to unite with other leading Internet companies to advocate on behalf of our consumers,” said Tim Armstrong, Chairman and CEO, AOL.

"Reports about government surveillance have shown there is a real need for greater disclosure and new limits on how governments collect information. The U.S. Government should take this opportunity to lead this reform effort and make things right." ­ Mark Zuckerberg, CEO, Facebook

"The security of users’ data is critical, which is why we've invested so much in encryption and fight for transparency around government requests for information. This is undermined by the apparent wholesale collection of data, in secret and without independent oversight, by many governments around the world. It's time for reform and we urge the US government to lead the way.” ­ Larry Page, CEO, Google

"These principles embody Linkedin's fundamental commitment to transparency and ensuring appropriate government practices that are respectful of our members' expectations." ­ Erika Rottenberg, General Counsel, LinkedIn.

“People won’t use technology they don’t trust. Governments have put this trust at risk, and governments need to help restore it.” ­­ Brad Smith, General Counsel and Executive Vice President, Legal and Corporate Affairs, Microsoft

"Twitter is committed to defending and protecting the voice of our users. Unchecked, undisclosed government surveillance inhibits the free flow of information and restricts their voice. The principles we advance today would reform the current system to appropriately balance the needs of security and privacy while safeguarding the essential human right of free expression.” ­ Dick Costolo, CEO, Twitter

"Protecting the privacy of our users is incredibly important to Yahoo. Recent revelations about government surveillance activities have shaken the trust of our users, and it is time for the United States government to act to restore the confidence of citizens around the world. Today we join our colleagues in the tech industry calling on the United States Congress to change surveillance laws in order to ensure transparency and accountability for government actions.” ­ Marissa Mayer, CEO, Yahoo.

Full View / NID: 46296 / Submitted by: The Zilla of Zuron

12.05.2013 - Microsoft, the FBI, Europol and industry partners disrupt the notorious ZeroAccess botnet



View Microsoft-Press related news.

REDMOND , Wash. Dec. 5 , 2013 — The Microsoft Digital Crimes Unit today announced it has successfully disrupted a rampant botnet in collaboration with Europol’s European Cybercrime Centre (EC3), the Federal Bureau of Investigation (FBI) and leaders in the technology industry, including A10 Networks Inc. The Sirefef botnet, also known as ZeroAccess, is responsible for infecting more than 2 million computers, specifically targeting search results on Google, Bing and Yahoo search engines, and is estimated to cost online advertisers $2.7 million each month. Today’s action is expected to significantly disrupt the botnet’s operation, increasing the cost and risk for cybercriminals to continue doing business and preventing victims’ computers from committing fraudulent schemes.

This is Microsoft’s first botnet action since the Nov. 14 unveiling of its new Cybercrime Center — a center of excellence for advancing the global fight against cybercrime — and marks the company’s eighth botnet operation in the past three years. Similar to Microsoft’s Citadel botnet case, the ZeroAccess case is part of an extensive cooperative effort with international law enforcement and industry partners to dismantle cybercriminal networks and ensure that people worldwide can use their computing devices and services with confidence.

“This operation marks an important step in coordinated actions that are initiated by private companies and, at the same time, enable law enforcement agencies around Europe to identify and investigate the criminal organizations and networks behind these dangerous botnets that use malicious software to gain illicit profits,” said Troels Oerting, head of the EC3. “EC3 added its expertise, information communications technology infrastructure and analytic capability, as well as provided the platform for high-level cooperation between cybercrime units in five European countries and Microsoft.”

Due to its botnet architecture, ZeroAccess is one of the most robust and durable botnets in operation today and was built to be resilient to disruption efforts, relying on a peer-to-peer infrastructure that allows cybercriminals to remotely control the botnet from tens of thousands of different computers. ZeroAccess is used to commit a slew of crimes, including search hijacking, which “hijacks” people’s search results and redirects people to sites they had not intended or requested to go to in order to steal the money generated by their ad clicks. ZeroAccess also commits click fraud, which occurs when advertisers pay for clicks that are not the result of legitimate, interested human users’ clicks, but are the result of automated Web traffic and other criminal activity. Research by the University of California, San Diego shows that as of October 2013, 1.9 million computers were infected with ZeroAccess, and Microsoft determined there were more than 800,000 ZeroAccess-infected computers active on the Internet on any given day.

“The coordinated action taken by our partners was instrumental in the disruption of ZeroAccess; these efforts will stop victims’ computers from being used for fraud and help us identify the computers that need to be cleaned of the infection,” said David Finn, executive director and associate general counsel of the Microsoft Digital Crimes Unit. “Microsoft is committed to working collaboratively — with our customers, partners, academic experts and law enforcement — to combat cybercrime. And we’ll do everything we can to protect computer users from the sinister activities and criminal networks that victimize innocent people and businesses around the world.”

Last week, Microsoft filed a civil suit against the cybercriminals operating the ZeroAccess botnet and received authorization from the U.S. District Court for the Western District of Texas to simultaneously block incoming and outgoing communications between computers located in the U.S. and the 18 identified Internet Protocol (IP) addresses being used to commit the fraudulent schemes. In addition, Microsoft took over control of 49 domains associated with the ZeroAccess botnet. A10 Networks provided Microsoft with advanced technology to support the disruptive action.

As Microsoft executed the order filed in its civil case, Europol coordinated a multijurisdictional criminal action targeting the 18 IP addresses located in Europe. Specifically, Europol worked with Latvia, Luxembourg, Switzerland, the Netherlands and Germany to execute search warrants and seizures on computer servers associated with the fraudulent IP addresses located in Europe.

This is the second time in six months that Microsoft and law enforcement have worked together to successfully disrupt a prevalent botnet. It demonstrates the value coordinated operations have against cybercriminal enterprises.

“If the hacker community has not yet taken notice, today’s disruption of the ZeroAccess botnet is another example of the power of public-private partnerships,” FBI Executive Assistant Director Richard McFeely said. “It demonstrates our commitment to expand coordination with companies like Microsoft and our foreign law enforcement partners — in this case, Europol — to shut down malicious cyberattacks and hold cybercriminals accountable for exploiting our citizens’ and businesses’ computers.”

Microsoft and its partners do not expect to fully eliminate the ZeroAccess botnet due to the complexity of the threat. However, Microsoft expects that this action will significantly disrupt the botnet’s operation. Microsoft is working with ecosystem partners around the world to notify people if their computers are infected and will make this information available through its Cyber Threat Intelligence Program (C-TIP). ZeroAccess is very sophisticated malware, blocking attempts to remove it, and Microsoft therefore recommends that people visit http://support.microsoft.com/botnets for detailed instructions on how to remove this threat. Because Microsoft found that the ZeroAccess malware disables security features on infected computers, leaving the computer susceptible to secondary infections, it is critical that victims rid their computers of ZeroAccess by using malware removal or antivirus software as quickly as possible. Europol is also providing information on its website about botnets to educate the public on how to protect themselves.

More information about today’s news and the coordinated action against ZeroAccess is available at http://www.microsoft.com/en-us/news/presskits/dcu. Legal documentation in the case can be found at http://www.botnetlegalnotice.com/ZeroAccess.

About Europol

EC3 is the focal point in the EU’s fight against cybercrime, contributing to faster reactions in the event of online crimes. It will support Member States and the European Union’s institutions in building operational and analytical capacity for investigations and cooperation with international partners. EC3 officially commenced its activities on 1 January 2013, and it aims to become the focal point in the EU’s fight against cybercrime, through building operational and analytical capacity for investigations and cooperation with international partners in the pursuit of an EU free from cybercrime. The European Cybercrime Centre is hosted by Europol; the European law enforcement agency in The Hague, The Netherlands, and thus EC3 can draw on Europol’s existing infrastructure and law enforcement network.

About FBI

As an intelligence-driven and a threat-focused national security organization with both intelligence and law enforcement responsibilities, the mission of the FBI is to protect and defend the United States against terrorist and foreign intelligence threats, including cyber-based attacks and high-technology crimes; to uphold and enforce the criminal laws of the United States; and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners.

About A10 Networks

A10 Networks was founded in Q4 2004 with a mission to provide innovative networking and security solutions. A10 Networks makes high-performance products that help organizations accelerate, optimize and secure their applications. A10 Networks is headquartered in Silicon Valley with offices in the United States, United Kingdom, France, The Netherlands, Germany, Spain, Brazil, Japan, China, Korea, Taiwan, Hong Kong, Singapore and Malaysia. For more information, visit: http://www.a10networks.com.

About Microsoft

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

N ote to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Full View / NID: 46290 / Submitted by: The Zilla of Zuron

12.02.2013 - Bing shares the top global searches of 2013



View Microsoft-Press related news.

REDMOND, Wash. — Dec. 1, 2013 — Looking back on 2013, billions of searches on Bing from around the world reveal it was a year of American songs, superhero movies, Facebook love, high-end designer brands, controversial sports stars, European getaways and fierce women. Bing search trends, found at http://www.BingTrends.com, indicate what has most captivated people around the world in 2013, and this year the trend report includes search data from Australia, Brazil, Canada, China, France, Germany, India, Italy, Japan, Spain, the U.K. and the U.S.

Most-searched people around the world

Ladies appeared to rule 2013, since a woman was the most-searched person of the year in eight of the 12 participating countries around the world — Beyoncé reigned in the U.S., while Miley Cyrus’ highly publicized twerking made her the top-searched person in both Australia and Canada. Former flames Justin Bieber and Selena Gomez were the most-searched people in the U.K. and Germany, respectively. Actress and actors Bruna Marquezine, Wen Zhang and Salman Khan were the most-searched people in Brazil, China and India, while singers Rihanna and David Bisbal ranked at the top for France and Spain, and gorgeous TV personalities Danmitsu and Belen Rodriguez were favorites in Japan and Italy.

Most-searched person in the U.S.

With an amazing Super Bowl performance — including a reunion with Destiny’s Child — as well as a successful world tour and famous family, Beyoncé captivated Americans this year and was the most-searched person on Bing in the U.S. She earned not only the title of most-searched person, but the most-searched musician nod as well. Fellow musician Rihanna also came out near the top for 2013, earning both the No. 3 spot as most-searched person and No. 2 for most-searched musician. Newcomers to the top 10 this year include Amanda Bynes at No. 8, Madonna at No. 5 and President Barack Obama at No. 10. Taylor Swift’s busy year in the public eye helped her make the biggest jump in rankings, going from No. 10 in 2012 to No. 4 this year:

Additional top Bing search results from the U.S. and around the world are available at http://www.BingTrends.com.

About Bing

Bing is the search engine from Microsoft. It was introduced in 2009 with a mission to empower people with knowledge — to answer any question and provide useful tools to help you best accomplish your goals, from the everyday to the extraordinary. Bing continues on that mission today by moving beyond the search box to power intelligent experiences across a range of devices and services from Microsoft and third parties.

About Microsoft

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Full View / NID: 46281 / Submitted by: The Zilla of Zuron

11.22.2013 - Xbox One launch begins a new generation of games



View Microsoft-Press related news.


May 20, 2013
Xbox One is an all-in-one gaming and entertainment system that puts you at the center of all your games, TV, movies, music, sports and Skype.
Downloads:
Web | Print

REDMOND, W ash. Nov. 21 , 201 3 The launch of Xbox One Friday signals the beginning of a new era for gaming and interactive entertainment. Boasting the deepest and most varied launch lineup in Xbox history, the new games and exclusive titles look and feel like nothing else, tapping the incredible power of new hardware and the cloud, as well as advanced software tools and exclusive features such as Xbox Live, Kinect and Xbox One SmartGlass that will bring an entirely new world of gaming to life.

The award-winning launch lineup of games on Xbox One features 22 titles from some of the world’s most respected developers, as well as 10 exclusive games you won’t find anywhere else. Whether it’s experiencing the vivid realism of the racetrack to the visceral brutality of ancient Rome, from the zombie apocalypse to a wildlife utopia, the lineup of Xbox One exclusives launching Friday offers new immersive worlds for every kind of gamer to explore:

  • “Forza Motorsport 5” is a cinematic automotive journey starring the world’s greatest cars and tracks. Built from the ground up to take advantage of Xbox One and the vast power of the cloud, no game better delivers the wide-eyed thrill of racing.

  • “Ryse: Son of Rome” is an immersive action-adventure story of struggle, brutality and heroism, following a fearless Roman soldier named Marius Titus as he seeks to avenge the death of his family and save the Roman Empire. “Ryse: Son of Rome” presents a cinematic recreation of the ancient Roman Empire and its people, conflicts and landscapes, in breathtaking detail that represents the graphical benchmark for the new platform generation.

  • “Dead Rising 3” delivers a blockbuster open-world action experience that will define a new generation of zombie-slaying mayhem. Featuring intense action, incredible weapon and character customization, and immersive Xbox SmartGlass and Kinect integration, “Dead Rising 3” delivers a heart-pounding experience unlike any other as players fight for survival in a massive, open world teeming with the undead.

  • “Zoo Tycoon” is back and fully reimagined for Xbox One. The wildly popular franchise cranks up the challenge and fun of building the ultimate zoo and allows players to seamlessly switch between controller and Kinect play to interact with ultrarealistic animals. Supported with next-generation technology, the Xbox One version will have greater visual fidelity, larger zoos, more animals, Game DVR capability, Skype chat and four-person multiplayer over Xbox Live.*

  • “Kinect Sports Rivals” Preseason is a free trial experience of “Kinect Sports Rivals” wake racing, available for download on launch day. Monthly challenges and exclusive in-game rewards let players get ahead of the competition before the full game launches in spring 2014. The all-new, re-engineered Kinect in Xbox One puts you in the game like never before, tracks your movements and expressions with incredible accuracy, and offers never-ending competition with your friends and competitors.

  • Digital games on Xbox One feature next-generation graphics and entertainment. “Killer Instinct” brings the classic fighting action and popular characters of the original franchise exclusively to Xbox One. With its enhanced combat system, players will enjoy intense gameplay and stunning next-generation graphics. Fly through the skies in “Crimson Dragon,” a rail shooting game that takes place on a recently colonized planet populated by dragons. Use the power of Kinect to dodge enemies and communicate with your partner dragon. In “LocoCycle,” try your skills in the immersive combat racing game that takes you on a thrilling ride with I.R.I.S., a weaponized motorcycle, as she drags her mechanic, Pablo, through highways, canyons and waterways while battling Big Arms and the deadly counter-assault motorcycle, S.P.I.K.E. Or test your talents on the green in “Powerstar Golf,” a fun, animated sports game that challenges you against one of six unique characters with special golfing abilities. With the power of the cloud, you can set course records and play against your friends’ best scores in Rival Mode while they sleep.

In addition to the blockbuster titles created by Microsoft Studios, Xbox One will be home to the world’s best games. Fan favorites including “Call of Duty®: Ghosts,” “Assassin’s Creed IV Black Flag,” “FIFA 14,” Madden NFL 25” and “Battlefield 4” will all be available on Xbox One at launch. Highly anticipated exclusives including “Titanfall,” “Sunset Overdrive” and “Quantum Break” guarantee a rich pipeline of new games to look forward to after launch, as well as multiplatform games including “Final Fantasy XV,” “Kingdom Hearts III” and “Watch Dogs.” Xbox One will also be the first place to get new map packs and other add-ons, with early exclusivity on downloadable content for “Call of Duty®: Ghosts,” “FIFA 14,” “Battlefield 4” and more. The games portfolio will only continue to grow with ID@Xbox, with many independent developers already on board to deliver innovative experiences in the coming months.

This is the full list of Xbox One games available Friday:

  • “Assassin’s Creed IV Black Flag” (Ubisoft, Ubisoft)

  • “Battlefield 4” (DICE, Electronic Arts)

  • “Call of Duty®: Ghosts” (Infinity Ward, Activision)

  • “Crimson Dragon” (Grounding/Land Ho!, Microsoft Studios)

  • “Dead Rising 3” (Capcom Vancouver, Microsoft)

  • “FIFA 14” (EA Sports, Electronic Arts)

  • “Fighter Within” (AMA Ltd., Ubisoft)

  • “Forza Motorsport 5” (Turn 10 Studios, Microsoft Studios)

  • “Just Dance 2014” (Ubisoft Paris, Ubisoft)

  • “Killer Instinct” (Double Helix, Microsoft Studios)

  • “LEGO® Marvel™ Super Heroes” (TT Games, Warner Bros. Interactive Entertainment)

  • “LocoCycle” (Twisted Pixel, Microsoft Studios)

  • “Madden NFL 25” (EA Sports, Electronic Arts)

  • “NBA® 2K14” (Visual Concepts, 2K)

  • “NBA LIVE 14” (EA Sports, Electronic Arts)

  • “Need for Speed Rivals” (Ghost Games, Electronic Arts)

  • “Powerstar Golf ” (Zoe Mode, Microsoft Studios)

  • “Ryse: Son of Rome” (Crytek, Microsoft Studios)

  • “Skylanders SWAP Force” (Vicarious Visions, Activision)

  • “Xbox Fitness” (Microsoft Studios)

  • “Zoo Tycoon” (Frontier Developments Microsoft Studios)

  • “Zumba Fitness World Party” (Zoë Mode, Majesco)

For the latest on Xbox One availability in your market, visit Xbox.com. For more details about Xbox One, visit http://news.xbox.com. For press releases and media assets, visit http://news.xbox.com/media.

About Xbox

Xbox is Microsoft’s premier entertainment brand for the TV, phone, PC and tablet. In living rooms or on the go, Xbox is home to the best and broadest games, as well as one of the world’s largest libraries of movies, TV, music and sports. Your favorite games, TV and entertainment come to life in new ways through the power of Kinect, Xbox SmartGlass and Xbox Live, the world’s premier social entertainment network. More information about Xbox can be found online at http://www.xbox.com.

About Microsoft

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

The information contained in this press release relates to a pre-release product that may be substantially modified before its first commercial release. Accordingly, the information may not accurately describe or reflect the product when first commercially released. The press release is provided for informational purposes only, and Microsoft makes no warranties, express or implied, with respect to the press release or the information contained in it.

* Online multiplayer, Skype and Game DVR require an Xbox Live Gold Membership (sold separately).

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Full View / NID: 46265 / Submitted by: The Zilla of Zuron
  Most Viewed  
  Quick Links  
  Top Affiliates  
.......