Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     
  OS Technical Updates [Page: 10 of 267] @ TACKtech Corp.  

12.18.2013 - MS13-098 - Critical : Vulnerability in Windows Could Allow Remote Code Execution (2893294) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (December 18, 2013): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes".
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system.
Full View / NID: 46343 / Submitted by: The Zilla of Zuron

12.18.2013 - MS13-075 - Important : Vulnerability in Microsoft Office IME (Chinese) Could Allow Elevation of Privilege (2878687) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (December 18, 2013): Clarified that only implementations of Microsoft Pinyin IME 2010 are affected by the vulnerability. However, this update may be offered to systems with a non-vulnerable IME. This helps to maintain consistency for shared files across Office products. For more information, see the Update FAQ.
Summary: This security update resolves a privately reported vulnerability in Microsoft Office IME (Chinese). The vulnerability could allow elevation of privilege if a logged on attacker launches Internet Explorer from the toolbar in Microsoft Pinyin IME for Simplified Chinese. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. Only implementations of Microsoft Pinyin IME 2010 are affected by this vulnerability. Other versions of Simplified Chinese IME and other implementations of IME are not affected.
Full View / NID: 46342 / Submitted by: The Zilla of Zuron

12.18.2013 - University of Colorado Health looks to Office 365 to improve collaboration



View Microsoft-Press related news.

REDMOND, Wash. — Dec . 1 8 , 2013 — In less than three months, the University of Colorado Health (UCHealth), a new healthcare system formed by Poudre Valley Health System, University of Colorado Hospital and Memorial Health System, and one of the largest healthcare providers in Colorado, has fully migrated 17,000 mailboxes from three disparate healthcare organizations on multiple legacy email platforms into one single consolidated Microsoft Office 365 environment. Switching to a complete Microsoft enterprise subscription solution is expected to increase collaboration across UCHealth and save an estimated $13.9 million in overall costs throughout an 11-year period.

“The healthcare industry is generally hesitant to use the cloud because of security and HIPAA concerns,” said Steve Hess, chief information officer for UCHealth. “However, Microsoft’s strong commitment to data security, privacy and compliance with HIPAA standards, coupled with its willingness to sign a comprehensive Business Associate Agreement for Office 365, gave us the confidence we needed to overcome our cloud anxieties.”

UCHealth’s strategy was to integrate its legacy IT solutions into single solutions including its enterprise resource planning, electronic health records and email systems. UCHealth looked at a variety of vendors, including Google, but ultimately chose Office 365 because of its functionality and usability, and because it supports HIPAA requirements beyond what other vendors provide. In addition, UCHealth determined that Microsoft Corp. was a more strategic partner for both its long- and short-term IT and collaboration needs.

“When we decided to go with a subscription model, we knew we needed enterprise-class capabilities that offered strong support for all our needs, including offline editing, deskless workers and mobile devices,” said Fernando Pedroza, UCHealth’s vice president of Technology Services.

Differentiators for Office 365 range from enabling telework to promoting internal communications and cross-collaboration. The reliability and flexibility that comes from enablement of remote and mobile employees through the Office 365 SharePoint and Lync components, as well as Microsoft’s separate Yammer social media solution, appealed to UCHealth. With more of the healthcare workforce being mobile, and given UCHealth’s geographic spread, it was important to have additional tools available for remote collaboration and communication throughout UCHealth’s network. Specifically, Microsoft Office 365 Lync is being used to host meetings, share desktop presentations, and find appropriate individuals and expertise quickly and effectively. Meanwhile, Microsoft Yammer is being used to share information and project statuses, find expertise quickly, and celebrate organizational successes.

“In many ways, the healthcare industry is just scratching the surface of the potential applications of collaboration and social media tools,” Hess said, “but it is powerful to see how these tools are being applied, how they can drive real value to our workforce, and ultimately, how they can improve the quality of care and value for our patients.”

More information about how organizations are turning to Microsoft technology is available on the Microsoft Customer Spotlight newsroom.

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Full View / NID: 46341 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-006 - Important : Vulnerability in Microsoft Windows Could Allow Security Feature Bypass (2785220) - Version: 1.3



View Microsoft related news. Severity Rating: Important
Revision Note: V1.3 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2785220). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes.
Full View / NID: 46340 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-050 - Important : Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege (2839894) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2839894). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability.
Full View / NID: 46331 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-039 - Important : Vulnerability in HTTP.sys Could Allow Denial of Service (2829254) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2829254). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a specially crafted HTTP packet to an affected Windows server or client.
Full View / NID: 46330 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-046 - Important : Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation Of Privilege (2840221) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2829361) and Windows RT (2830290). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves three reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs onto the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities.
Full View / NID: 46329 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-054 - Critical : Vulnerability in GDI+ Could Allow Remote Code Execution (2848295) - Version: 1.3



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.3 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2835361) and for Windows RT (2835364). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows, Microsoft Office, Microsoft Lync, and Microsoft Visual Studio. The vulnerability could allow remote code execution if a user views shared content that embeds TrueType font files.
Full View / NID: 46328 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-062 - Important : Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege (2849470) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2849470). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request.
Full View / NID: 46327 / Submitted by: The Zilla of Zuron

12.16.2013 - MS13-081 - Critical : Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2870008) - Version: 1.3



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.3 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2862335). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves seven privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user views shared content that embeds OpenType or TrueType font files. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system.
Full View / NID: 46326 / Submitted by: The Zilla of Zuron

12.12.2013 - Leading cloud service providers around the globe bet on Microsoft



View Microsoft-Press related news.

REDMOND , W ash. Dec. 12 , 2013 — On Thursday, Microsoft Corp. introduced the Cloud OS Network, a worldwide consortium of more than 25 cloud service providers delivering services built on the Microsoft Cloud Platform: Windows Server with Hyper-V, System Center and the Windows Azure Pack. These organizations support Microsoft’s Cloud OS vision of a consistent platform that spans customer datacenters, Windows Azure and service provider clouds. Service providers in the Cloud OS Network offer Microsoft-validated, cloud-based infrastructure and application solutions designed to meet customer needs.

“This network of leading service providers will help our customers create datacenters without boundaries for apps, data and device management,” said Takeshi Numoto, Microsoft corporate vice president of Cloud & Enterprise Marketing. “That translates into greater diversity of solutions, more flexibility and lower operational costs for customers, allowing them to focus on their core business rather than managing datacenters.” More comments from Numoto can be found on the Official Microsoft Blog.

Hybrid b enefits for c ustomers

Every organization has different needs and different IT requirements for addressing those needs. With the Cloud OS Network, customers now have even more choice in deploying hybrid solutions on the Microsoft Cloud Platform — either in their datacenter, in Windows Azure or, now, through a network of service providers. Customers also benefit from uniquely tailored, fully managed services within their local market, as well as a high degree of technical consistency across environments, which prevents vendor lock-in and enables flexibility. As a result, customers can focus on increasing efficiencies, improving employee productivity and lowering operational costs. Customers interested in the Cloud OS Network and the services offered by these partners can find additional information here.

Cloud s ervice p rovider o pportunity

As cloud adoption accelerates, service providers are focused on delivering value-added services to meet customer demand for hybrid cloud solutions. By joining Microsoft in the Cloud OS Network, leading cloud service providers can quickly and cost-effectively develop new services, attract new customers and increase revenues. With the Microsoft Cloud Platform, service providers have access to the capabilities of and best practices from Windows Azure.

“CSC continues to expand our strategic partnership with Microsoft to increase value to our clients and bring next-gen solutions to market,” said Marc Silvester, vice president of Offerings Management at CSC. “CSC and Microsoft continue to partner on offerings that leverage the tremendous growth in apps, devices and data that are driven by the rise of cloud computing. As these technologies play an ever-increasing role in business, CSC and Microsoft are working together to drive more efficiency and value through Microsoft’s Cloud OS vision. CSC is proud to be part of Microsoft’s Cloud OS Network.”

Watch what service providers have to say about Microsoft’s new Cloud OS Network here.

Worldwide r each

Organizations within the Cloud OS Network cover more than 90 active markets around the world, serve more than 3 million customers every day and operate over 2.4 million servers in more than 425 datacenters.

The Cloud OS Network
The Cloud OS Network
December 11, 2013

Downloads:
Web | Print


Partners in the Cloud OS Network include, among others, Alog, Aruba S.p.A., Capgemini, Capita IT Services, CGI, CSC, Dimension Data, DorukNet, Fujitsu Finland Oy., Fujitsu Ltd., iWeb, Lenovo, NTTX, Outsourcery, OVH.com, Revera, SingTel, Sogeti, TeleComputing, Tieto, Triple C Cloud Computing, T-Systems, VTC Digilink and Wortmann AG.

More details on today’s announcements can be found at the Microsoft News Center.

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Full View / NID: 46314 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-105 - Critical : Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2915705) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (December 10, 2013): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes".
Summary: This security update resolves three publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft Exchange Server. The most severe of these vulnerabilities exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. These vulnerabilities could allow remote code execution in the security context of the LocalService account if an attacker sends an email message containing a specially crafted file to a user on an affected Exchange server. The LocalService account has minimum privileges on the local system and presents anonymous credentials on the network.
Full View / NID: 46309 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-102 - Important : Vulnerability in LRPC Client Could Allow Elevation of Privilege (2898715) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted LPC port message to any LPC consumer or server. An attacker who successfully exploited the vulnerability could then install programs; view, change, or delete data; or create new accounts with full administrator rights. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.
Full View / NID: 46307 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-103 - Important : Vulnerability in ASP.NET SignalR Could Allow Elevation of Privilege (2905244) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in ASP.NET SignalR. The vulnerability could allow elevation of privilege if an attacker reflects specially crafted JavaScript back to the browser of a targeted user.
Full View / NID: 46306 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-104 - Important : Vulnerability in Microsoft Office Could Allow Information Disclosure (2909976) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves one privately reported vulnerability in Microsoft Office that could allow information disclosure if a user attempts to open an Office file hosted on a malicious website. An attacker who successfully exploited this vulnerability could ascertain access tokens used to authenticate the current user on a targeted SharePoint or other Microsoft Office server site.
Full View / NID: 46305 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-105 - Critical : Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2915705) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves three publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft Exchange Server. The most severe of these vulnerabilities exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. These vulnerabilities could allow remote code execution in the security context of the LocalService account if an attacker sends an email message containing a specially crafted file to a user on an affected Exchange server. The LocalService account has minimum privileges on the local system and presents anonymous credentials on the network.
Full View / NID: 46304 / Submitted by: The Zilla of Zuron

12.10.2013 - MS13-106 - Important : Vulnerability in a Microsoft Office Shared Component Could Allow Security Feature Bypass (2905238) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves one publicly disclosed vulnerability in a Microsoft Office shared component that is currently being exploited. The vulnerability could allow security feature bypass if a user views a specially crafted webpage in a web browser capable of instantiating COM components, such as Internet Explorer. In a web-browsing attack scenario, an attacker who successfully exploited this vulnerability could bypass the Address Space Layout Randomization (ASLR) security feature, which helps protect users from a broad class of vulnerabilities. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability that could take advantage of the ASLR bypass to run arbitrary code.
Full View / NID: 46303 / Submitted by: The Zilla of Zuron

12.09.2013 - Tech Company Coalition Supports Global Surveillance Principles, Calls on US to Lead Reform Efforts



View Microsoft-Press related news.

WASHINGTON, DC — Dec. 9, 2013 — Today AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter and Yahoo joined together to propose principles for reforming government surveillance laws and practices. The companies also urged the President and the United States Congress to take the lead on reform with an open letter that reads:

Dear Mr. President and Members of Congress,

We understand that governments have a duty to protect their citizens. But this summer’s

revelations highlighted the urgent need to reform government surveillance practices worldwide. The balance in many countries has tipped too far in favor of the state and away from the rights of the individual­­rights that are enshrined in our Constitution. This undermines the freedoms we all cherish. It’s time for change.

For our part, we are focused on keeping users’ data secure­­deploying the latest encryption technology to prevent unauthorized surveillance on our networks, and by pushing back on government requests to ensure that they are legal and reasonable in scope.

We urge the US to take the lead and make reforms that ensure that government surveillance efforts are clearly restricted by law, proportionate to the risks, transparent and subject to independent oversight. To see the full set of principles we support, visit www.reformgovernmentsurveillance.com.

AOL Apple Facebook Google LinkedIn Microsoft Twitter Yahoo

Company executives also provided statements on the principles of reform:

“AOL is committed to preserving the privacy of our customers' information, while respecting the right of governments to request information on specific users for lawful purposes. AOL is proud to unite with other leading Internet companies to advocate on behalf of our consumers,” said Tim Armstrong, Chairman and CEO, AOL.

"Reports about government surveillance have shown there is a real need for greater disclosure and new limits on how governments collect information. The U.S. Government should take this opportunity to lead this reform effort and make things right." ­ Mark Zuckerberg, CEO, Facebook

"The security of users’ data is critical, which is why we've invested so much in encryption and fight for transparency around government requests for information. This is undermined by the apparent wholesale collection of data, in secret and without independent oversight, by many governments around the world. It's time for reform and we urge the US government to lead the way.” ­ Larry Page, CEO, Google

"These principles embody Linkedin's fundamental commitment to transparency and ensuring appropriate government practices that are respectful of our members' expectations." ­ Erika Rottenberg, General Counsel, LinkedIn.

“People won’t use technology they don’t trust. Governments have put this trust at risk, and governments need to help restore it.” ­­ Brad Smith, General Counsel and Executive Vice President, Legal and Corporate Affairs, Microsoft

"Twitter is committed to defending and protecting the voice of our users. Unchecked, undisclosed government surveillance inhibits the free flow of information and restricts their voice. The principles we advance today would reform the current system to appropriately balance the needs of security and privacy while safeguarding the essential human right of free expression.” ­ Dick Costolo, CEO, Twitter

"Protecting the privacy of our users is incredibly important to Yahoo. Recent revelations about government surveillance activities have shaken the trust of our users, and it is time for the United States government to act to restore the confidence of citizens around the world. Today we join our colleagues in the tech industry calling on the United States Congress to change surveillance laws in order to ensure transparency and accountability for government actions.” ­ Marissa Mayer, CEO, Yahoo.

Full View / NID: 46296 / Submitted by: The Zilla of Zuron

12.05.2013 - Microsoft, the FBI, Europol and industry partners disrupt the notorious ZeroAccess botnet



View Microsoft-Press related news.

REDMOND , Wash. Dec. 5 , 2013 — The Microsoft Digital Crimes Unit today announced it has successfully disrupted a rampant botnet in collaboration with Europol’s European Cybercrime Centre (EC3), the Federal Bureau of Investigation (FBI) and leaders in the technology industry, including A10 Networks Inc. The Sirefef botnet, also known as ZeroAccess, is responsible for infecting more than 2 million computers, specifically targeting search results on Google, Bing and Yahoo search engines, and is estimated to cost online advertisers $2.7 million each month. Today’s action is expected to significantly disrupt the botnet’s operation, increasing the cost and risk for cybercriminals to continue doing business and preventing victims’ computers from committing fraudulent schemes.

This is Microsoft’s first botnet action since the Nov. 14 unveiling of its new Cybercrime Center — a center of excellence for advancing the global fight against cybercrime — and marks the company’s eighth botnet operation in the past three years. Similar to Microsoft’s Citadel botnet case, the ZeroAccess case is part of an extensive cooperative effort with international law enforcement and industry partners to dismantle cybercriminal networks and ensure that people worldwide can use their computing devices and services with confidence.

“This operation marks an important step in coordinated actions that are initiated by private companies and, at the same time, enable law enforcement agencies around Europe to identify and investigate the criminal organizations and networks behind these dangerous botnets that use malicious software to gain illicit profits,” said Troels Oerting, head of the EC3. “EC3 added its expertise, information communications technology infrastructure and analytic capability, as well as provided the platform for high-level cooperation between cybercrime units in five European countries and Microsoft.”

Due to its botnet architecture, ZeroAccess is one of the most robust and durable botnets in operation today and was built to be resilient to disruption efforts, relying on a peer-to-peer infrastructure that allows cybercriminals to remotely control the botnet from tens of thousands of different computers. ZeroAccess is used to commit a slew of crimes, including search hijacking, which “hijacks” people’s search results and redirects people to sites they had not intended or requested to go to in order to steal the money generated by their ad clicks. ZeroAccess also commits click fraud, which occurs when advertisers pay for clicks that are not the result of legitimate, interested human users’ clicks, but are the result of automated Web traffic and other criminal activity. Research by the University of California, San Diego shows that as of October 2013, 1.9 million computers were infected with ZeroAccess, and Microsoft determined there were more than 800,000 ZeroAccess-infected computers active on the Internet on any given day.

“The coordinated action taken by our partners was instrumental in the disruption of ZeroAccess; these efforts will stop victims’ computers from being used for fraud and help us identify the computers that need to be cleaned of the infection,” said David Finn, executive director and associate general counsel of the Microsoft Digital Crimes Unit. “Microsoft is committed to working collaboratively — with our customers, partners, academic experts and law enforcement — to combat cybercrime. And we’ll do everything we can to protect computer users from the sinister activities and criminal networks that victimize innocent people and businesses around the world.”

Last week, Microsoft filed a civil suit against the cybercriminals operating the ZeroAccess botnet and received authorization from the U.S. District Court for the Western District of Texas to simultaneously block incoming and outgoing communications between computers located in the U.S. and the 18 identified Internet Protocol (IP) addresses being used to commit the fraudulent schemes. In addition, Microsoft took over control of 49 domains associated with the ZeroAccess botnet. A10 Networks provided Microsoft with advanced technology to support the disruptive action.

As Microsoft executed the order filed in its civil case, Europol coordinated a multijurisdictional criminal action targeting the 18 IP addresses located in Europe. Specifically, Europol worked with Latvia, Luxembourg, Switzerland, the Netherlands and Germany to execute search warrants and seizures on computer servers associated with the fraudulent IP addresses located in Europe.

This is the second time in six months that Microsoft and law enforcement have worked together to successfully disrupt a prevalent botnet. It demonstrates the value coordinated operations have against cybercriminal enterprises.

“If the hacker community has not yet taken notice, today’s disruption of the ZeroAccess botnet is another example of the power of public-private partnerships,” FBI Executive Assistant Director Richard McFeely said. “It demonstrates our commitment to expand coordination with companies like Microsoft and our foreign law enforcement partners — in this case, Europol — to shut down malicious cyberattacks and hold cybercriminals accountable for exploiting our citizens’ and businesses’ computers.”

Microsoft and its partners do not expect to fully eliminate the ZeroAccess botnet due to the complexity of the threat. However, Microsoft expects that this action will significantly disrupt the botnet’s operation. Microsoft is working with ecosystem partners around the world to notify people if their computers are infected and will make this information available through its Cyber Threat Intelligence Program (C-TIP). ZeroAccess is very sophisticated malware, blocking attempts to remove it, and Microsoft therefore recommends that people visit http://support.microsoft.com/botnets for detailed instructions on how to remove this threat. Because Microsoft found that the ZeroAccess malware disables security features on infected computers, leaving the computer susceptible to secondary infections, it is critical that victims rid their computers of ZeroAccess by using malware removal or antivirus software as quickly as possible. Europol is also providing information on its website about botnets to educate the public on how to protect themselves.

More information about today’s news and the coordinated action against ZeroAccess is available at http://www.microsoft.com/en-us/news/presskits/dcu. Legal documentation in the case can be found at http://www.botnetlegalnotice.com/ZeroAccess.

About Europol

EC3 is the focal point in the EU’s fight against cybercrime, contributing to faster reactions in the event of online crimes. It will support Member States and the European Union’s institutions in building operational and analytical capacity for investigations and cooperation with international partners. EC3 officially commenced its activities on 1 January 2013, and it aims to become the focal point in the EU’s fight against cybercrime, through building operational and analytical capacity for investigations and cooperation with international partners in the pursuit of an EU free from cybercrime. The European Cybercrime Centre is hosted by Europol; the European law enforcement agency in The Hague, The Netherlands, and thus EC3 can draw on Europol’s existing infrastructure and law enforcement network.

About FBI

As an intelligence-driven and a threat-focused national security organization with both intelligence and law enforcement responsibilities, the mission of the FBI is to protect and defend the United States against terrorist and foreign intelligence threats, including cyber-based attacks and high-technology crimes; to uphold and enforce the criminal laws of the United States; and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners.

About A10 Networks

A10 Networks was founded in Q4 2004 with a mission to provide innovative networking and security solutions. A10 Networks makes high-performance products that help organizations accelerate, optimize and secure their applications. A10 Networks is headquartered in Silicon Valley with offices in the United States, United Kingdom, France, The Netherlands, Germany, Spain, Brazil, Japan, China, Korea, Taiwan, Hong Kong, Singapore and Malaysia. For more information, visit: http://www.a10networks.com.

About Microsoft

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

N ote to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Full View / NID: 46290 / Submitted by: The Zilla of Zuron

12.02.2013 - Bing shares the top global searches of 2013



View Microsoft-Press related news.

REDMOND, Wash. — Dec. 1, 2013 — Looking back on 2013, billions of searches on Bing from around the world reveal it was a year of American songs, superhero movies, Facebook love, high-end designer brands, controversial sports stars, European getaways and fierce women. Bing search trends, found at http://www.BingTrends.com, indicate what has most captivated people around the world in 2013, and this year the trend report includes search data from Australia, Brazil, Canada, China, France, Germany, India, Italy, Japan, Spain, the U.K. and the U.S.

Most-searched people around the world

Ladies appeared to rule 2013, since a woman was the most-searched person of the year in eight of the 12 participating countries around the world — Beyoncé reigned in the U.S., while Miley Cyrus’ highly publicized twerking made her the top-searched person in both Australia and Canada. Former flames Justin Bieber and Selena Gomez were the most-searched people in the U.K. and Germany, respectively. Actress and actors Bruna Marquezine, Wen Zhang and Salman Khan were the most-searched people in Brazil, China and India, while singers Rihanna and David Bisbal ranked at the top for France and Spain, and gorgeous TV personalities Danmitsu and Belen Rodriguez were favorites in Japan and Italy.

Most-searched person in the U.S.

With an amazing Super Bowl performance — including a reunion with Destiny’s Child — as well as a successful world tour and famous family, Beyoncé captivated Americans this year and was the most-searched person on Bing in the U.S. She earned not only the title of most-searched person, but the most-searched musician nod as well. Fellow musician Rihanna also came out near the top for 2013, earning both the No. 3 spot as most-searched person and No. 2 for most-searched musician. Newcomers to the top 10 this year include Amanda Bynes at No. 8, Madonna at No. 5 and President Barack Obama at No. 10. Taylor Swift’s busy year in the public eye helped her make the biggest jump in rankings, going from No. 10 in 2012 to No. 4 this year:

Additional top Bing search results from the U.S. and around the world are available at http://www.BingTrends.com.

About Bing

Bing is the search engine from Microsoft. It was introduced in 2009 with a mission to empower people with knowledge — to answer any question and provide useful tools to help you best accomplish your goals, from the everyday to the extraordinary. Bing continues on that mission today by moving beyond the search box to power intelligent experiences across a range of devices and services from Microsoft and third parties.

About Microsoft

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Full View / NID: 46281 / Submitted by: The Zilla of Zuron
  Most Viewed  
  Quick Links  
  Top Affiliates  
.......