Microsoft Security Newsletter - November 2013
Trustworthy Computing | November 2013
Microsoft Security Newsletter
Welcome to November’s Security Newsletter!
This month our newsletter focuses on the top threats facing enterprise organizations. Many of the customers I talk with around the world are faced with increased business complexities combined with resource and financial constraints and are interested in learning how to prioritize their security investments to manage security risk. One of the key inputs to help prioritize security risk is threat intelligence. A few weeks ago, we published volume 15 of the
http://www.microsoft.com/sir
Microsoft Security Intelligence Report (SIR) . In the report, we list out the top 10 threats facing enterprises. Based on our research, enterprises encounter malware via three primary avenues: a) malicious or compromised websites, worms that spread through networked drives, and autorun feature abuse; b) weak passwords; or c) social engineering.
By the end of 2012, web-based attacks had surpassed traditional network worms to become the top threats facing enterprises and the latest SIR shows that this trend is continuing. In fact, during the second quarter of 2013, six out of the top 10 threats facing enterprises were associated with malicious or compromised websites. While web-based attacks have become the most common threats facing enterprises, worms cannot be ignored. In the second quarter of 2013 three out of the top ten threats facing enterprises were associated with worms. The third most common way in which enterprise organizations are encountering malware based on the latest threat intelligence is through social engineering.
The good news is that there are effective mitigations and best practices that can be used to help protect your enterprise such as keeping all software up to date, running software that was developed with a security development lifecycle, restricting web browsing, managing the security of your websites, and leveraging network security technologies. If you are interested in learning more about the top threats facing enterprises and how to take action, I encourage you to check out our recent blog post entitled, "
http://blogs.technet.com/b/security/archive/2013/11/25/microsoft-cybersecurity- report-top-10-most-wanted-enterprise-threats.aspx
Microsoft Cybersecurity Report: Top 10 Most Wanted Enterprise Threats ."
Of course, this is just one of many key takeaways from the latest SIR. To download the complete report, which includes regional threat intelligence for 106 locations around the world, visit
http://www.microsoft.com/sir
www.microsoft.com/sir . We hope you enjoy it and encourage you to provide feedback to our Twitter handle
https://twitter.com/msftsecurity
@MSFTSecurity .
Best regards,
Tim Rains, Director
Microsoft
Trustworthy
Computing
Have feedback on how we can improve this newsletter? Email us at mailto:
secnlfb@microsoft.com
secnlfb@microsoft.com and share your ideas.
Top Stories
http://blogs.technet.com/b/srd/archive/2013/11/12/introducing-enhanced-mitigati on-experience-toolkit-emet-4-1.aspx
Enhanced Mitigation Experience Toolkit 4.1 Released
The Enhanced Mitigation Experience Toolkit (EMET) helps prevent attackers from gaining access to computers, works well in the enterprise, and protects across a wide range of scenarios. Now available for download,
http://www.microsoft.com/download/details.aspx?id=41138
EMET 4.1 includes updates that simplify configuration and enable faster deployment.
http://blogs.technet.com/b/security/archive/2013/11/07/maslow-and-malware-devel oping-a-hierarchy-of-needs-for-cybersecurity.aspx
Maslow and Malware: Developing a Hierarchy of Needs for Cybersecurity
Pervasive use of computing and the Internet means that companies need plans in place to ensure key assets, systems and networks remain protected, while preserving the benefits that come with broad connectivity. As approaches vary country to country, Microsoft recently partnered with Oxford-Analytica to develop a
http://download.microsoft.com/download/E/6/2/E62530BF-47CC-4527-88BA-F13DF5294A 65/HierarchyofCybersecurityNeeds.pdf
downloadable report that looks at how organizations can seek to maximize the benefits of the Internet by matching their cybersecurity priorities to the needs of their citizens.
Security Guidance
http://technet.microsoft.com/security/dn535790.aspx
Ransomware in the Enterprise
Marianne Mallen (Antivirus Researcher), Vidya Sekhar (Program Manager), Ben Hope (Technical Writer) –
http://www.microsoft.com/security/portal/mmpc/default.aspx
Microsoft Malware Protection Center
One problem affecting the enterprise space is ransomware, a type of malware designed to render a computer or its files unusable until you pay a certain amount of money to the attacker. Learn more about this threat and how to deal with a ransomware infection. For additional tips on how to protect your organization, see
http://blogs.technet.com/b/trustworthycomputing/archive/2013/11/19/ransomware-w ays-to-protect-yourself-amp-your-business.aspx
Ransomware: Ways to Protect Yourself & Your Business .
http://technet.microsoft.com/security/dn535789.aspx
Security Keeps the Money Flowing: A Framework for Data Loss Prevention
http://mvp.microsoft.com/en-us/mvp/Dan Griffin-4024470
Dan Griffin , Microsoft MVP – Enterprise Security and Founder of JW Secure, Inc.
The importance of protecting sensitive or important data is paramount for any business. While security technology today is amazingly advanced, so is the motivation and sophistication of the threat landscape. Explore a framework that can help you better evaluate data loss prevention (DLP) technologies for your organization.
http://technet.microsoft.com/library/cc162838.aspx
Malware Response Guide
Download the Infrastructure Planning and Design Guide for Malware Response for help with planning the best and most cost-effective response to malicious software for your organization. This free guide provides methodologies for the assessment of malware incidents, walks through the considerations and decisions that are pertinent to timely response and recovery, and describes approaches to investigating outbreaks and cleaning infected systems.
http://technet.microsoft.com/en-us/library/exchange-online-antispam-and-antimal ware-protection.aspx
Anti-Spam and Anti-Malware Protection with Exchange Online
Microsoft Exchange Online provides built-in malware and spam filtering capabilities that help protect inbound and outbound messages from malicious software and help protect your network from spam transferred through email. Explore the filtering technologies enabled by default, then learn how to configure and customize
http://technet.microsoft.com/library/jj200745.aspx
anti-malware policies and
http://technet.microsoft.com/library/jj200687.aspx
anti-spam policies .
http://technet.microsoft.com/library/cc162838.aspx
Malware Response Guide
Download the Infrastructure Planning and Design Guide for Malware Response for help with planning the best and most cost-effective response to malicious software for your organization. This free guide provides methodologies for the assessment of malware incidents, walks through the considerations and decisions that are pertinent to timely response and recovery, and describes approaches to investigating outbreaks and cleaning infected systems.
http://blogs.msdn.com/b/ie/archive/2012/03/14/enhanced-protected-mode.aspx Enhanced Protected Mode in Internet Explorer
Learn how Enhanced Protected Mode, included in Internet Explorer 10 and Internet Explorer 11, helps keep your data safe even if an attacker has exploited a vulnerability in the browser or one of its add-ons. Looking for more technical details on this feature? Read
http://blogs.msdn.com/b/ieinternals/archive/2012/03/23/understanding-ie10-enhan ced-protected-mode-network-security-addons-cookies-metro-desktop.aspx Understanding Enhanced Protected Mode .
Cloud Security Corner
http://social.technet.microsoft.com/wiki/contents/articles/6642.a-solution-for- private-cloud-security.aspx
A Solution for Private Cloud Security
With increasing numbers of organizations looking to create cloud-based environments or implement cloud technologies within their existing data centers, business and technology decision-makers are looking closely at the possibilities and practicalities that these changes involve. Get a comprehensive explanation of the process for designing and running security for a private cloud environment.
This Month's Security Bulletins
November 2013 Security Bulletins
Critical
-MS13-088:2888505
https://technet.microsoft.com/en-us/security/bulletin/ms13-088
Cumulative Security Update for Internet Explorer
-MS13-089:2876331
https://technet.microsoft.com/en-us/security/bulletin/ms13-089
Vulnerability in Windows Graphics Device Interface Could Allow Remote Code Execution
-MS13-090:2900986
https://technet.microsoft.com/en-us/security/bulletin/ms13-090
Cumulative Security Update of ActiveX Kill Bits
Important
-MS13-091:2885093
https://technet.microsoft.com/en-us/security/bulletin/ms13-091
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution
-MS13-092:2893986
https://technet.microsoft.com/en-us/security/bulletin/ms13-092
Vulnerability in Hyper-V Could Allow Elevation of Privilege
-MS13-093:2875783
https://technet.microsoft.com/en-us/security/bulletin/ms13-093
Vulnerability in Windows Ancillary Function Driver Could Allow Information Disclosure
-MS13-094:2894514
https://technet.microsoft.com/en-us/security/bulletin/ms13-094
Vulnerability in Microsoft Outlook Could Allow Information Disclosure
-MS13-095:2868626
https://technet.microsoft.com/en-us/security/bulletin/ms13-095
Vulnerability in Digital Signatures Could Allow Denial of Service
November 2013 Security Bulletin Resources:
- h
http://blogs.technet.com/b/msrc/archive/2013/11/12/authenticity-and-the-novemb er-2013-security-updates.aspx
Microsoft Security Response Center (MSRC) Blog Post
-
http://youtu.be/KqVpF7QqFj0
Security Bulletin Webcast (MP4)
-
http://blogs.technet.com/b/msrc/p/november-2013-security-bulletin-q-a.aspx
Security Bulletin Webcast Q&A
Security Events and Training
https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032557386 Microsoft Webcast: Information about the December 2013 Security Bulletin Release
Wednesday, December 11, 2013
Join this webcast for a brief overview of the technical details of December’s Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.
https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032571337 Microsoft’s New Windows RMS – Advanced Information Protection Tuesday, December 17, 2013
Learn about the major updates to Microsoft's new Rights Management Services that can provide support for non-Microsoft file formats on multiple platforms including iOS and Android, and extend those capabilities beyond your organization to business partners and individuals.
Essential Tools
-
http://technet.microsoft.com/security/bulletin
Microsoft Security Bulletins
-
http://technet.microsoft.com/security/advisory
Microsoft Security Advisories
-
http://technet.microsoft.com/solutionaccelerators/cc835245.aspx
Security Compliance Manager
-
http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
Microsoft Security Development Lifecycle Starter Kit
-
http://support.microsoft.com/kb/2458544
Enhanced Mitigation Experience Toolkit
-
http://www.microsoft.com/security/pc-security/malware-removal.aspx
Malicious Software Removal Tool
-
http://technet.microsoft.com/security/cc184924.aspx
Microsoft Baseline Security Analyzer
Security Centers
-
http://technet.microsoft.com/security
Security TechCenter
-
http://msdn.microsoft.com/security
Security Developer Center
-
http://www.microsoft.com/security/msrc/default.aspx
Microsoft Security Response Center
-
http://www.microsoft.com/security/portal/
Microsoft Malware Protection Center
-
http://www.microsoft.com/privacy
Microsoft Privacy
-
http://support.microsoft.com/select/default.aspx?target=hub&c1=10750
Microsoft Security Product Solution Centers
Additional Resources
-
http://www.microsoft.com/about/twc/en/us/blogs.aspx
Trustworthy Computing Security and Privacy Blogs
-
http://www.microsoft.com/security/sir
Microsoft Security Intelligence Report
-
http://www.microsoft.com/security/sdl
Microsoft Security Development Lifecycle
-
http://technet.microsoft.com/library/cc162838.aspx
Malware Response Guide
-
http://technet.microsoft.com/security/bb980617.aspx
Security Troubleshooting and Support Resources
-
http://www.microsoft-careers.com/go/Trustworthy-Computing-Jobs/194701/ Trustworthy Computing Careers
microsoft.com/about/twcTrustworthy Computing
This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.
(c) 2013 Microsoft Corporation. All rights reserved. Microsoft, MSDN, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Microsoft respects your privacy. To learn more please read our online
http://go.microsoft.com/fwlink/?LinkId=81184
Privacy Statement .
If you would prefer to no longer receive this newsletter, please
http://pages.email.microsoftemail.com/page.aspx?QS=38dfbe491fab00ea380afe73db21 804e1836ec2291e123ed&emailid=277421&memberid=10030559&jobid=2676516&listid=8857 87&listname=Subscription_10030559_1109&subscriberkey=
lordtime@tds.net&emailaddr =
lordtime@tds.net&subscriberid=328026660
click here .
To set your contact preferences for other Microsoft communications
http://click.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b 6311d344a0079e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31 618dc832abaeba02aa2e4e965d8d2c8b9ab62f098fb9b896acf91a323dcc1b9b83813d
click here .
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052 USA
---
■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games