Ruud de Jonge

Ruud de Jonge

over Microsoft Platform en Security ontwikkelingen
The 72 Hour Conversation on the Future of the Web Starts with Dean, Joe, and Scott

clip_image002clip_image004clip_image006

At last year's MIX10 event, Windows Internet Explorer Corporate Vice President, Dean Hachamovitch, announced the Internet Explorer 9 Platform Preview 1 with hardware accelerated HTML5. This year, Dean will be back on the MIX stage as he returns as the day 1 keynoter at MIX11. Eight platform previews, one beta, one release candidate, and one final version of Internet Explorer 9 later - it’s a keynote you won’t want to miss.

But that’s not all! For the second year in a row, Joe Belfiore, who oversees Windows Phone Program Management, and is responsible for the design and software product definition of forthcoming generations of Windows phones and Zune devices will keynote MIX. By his side will be Scott Guthrie, who heads Microsoft's .NET Developer Platform, where he runs the development teams responsible for delivering Silverlight, Visual Studio and the .NET Framework technologies for building client and Web applications.

MIX is the entrée to the most thought-provoking experts and pioneering technologists discussing and debating the Internet nation today. More than 150 top thinkers in the web community will give sessions and panels all designed to prepare you for the innovations of the next web now. Topics at MIX run the gamut from RIA to web standards, media, video, cloud services, tooling, devices, games, plus the breakthroughs coming out of research. There’s no better place for a UX expert or a web architect to hear about the future of technologies like HTML5 and CSS3, Silverlight, Internet Explorer, Windows Phone, and ASP.NET.

Dean, Joe and Scott will set the stage for this exciting content and discussion that will be had at MIX this year, and YOU need to be part of that conversation.

clip_image007

Posted: Mar 10 2011, 09:20 AM door Ruud de Jonge | met no comments
Opgeslagen onder: , , , ,
Going to Mix in Vegas ?

clip_image001

clip_image002

clip_image003clip_image004clip_image006clip_image007

clip_image008

clip_image009

     
 

Early birds save big! Register by February 11 and save $500 on your conference pass and get one free hotel night. Register Now.

clip_image010

Unplug from your day job. Be inspired at MIX.

Join the conversation at MIX – see the latest tools and technologies and draw inspiration from a professional community of your peers and experts. More About MIX.

· PREVIEW THE NEXT WEB
MIX is where you’ll learn about the future of web, from the diversity of devices and interaction models on the front-end, to the tools and technologies that power the user experience, to the services that make it all possible. There’s no better place to hear about the future of Silverlight, Internet Explorer, Windows Phone, ASP.NET, and technologies like HTML5 and CSS3.

· GET REAL ANSWERS FROM THE EXPERTS
MIX isn’t just about getting a first look at the latest technologies and trends – it’s an opportunity for you to have your questions answered by industry and Microsoft experts.

· NETWORK WITH THE COMMUNITY
MIX is a gathering of developers, designers, UX experts and business professionals creating the most innovative and profitable consumer sites on the web. The opportunities for networking are limitless…this is Las Vegas, after all.

clip_image010[1]

 
 

Pre-Event Boot Camps at MIX11

Arrive a day early and immerse yourself in a full day of exclusive content presented by the industry’s most regarded experts. Whether you’re a designer or a developer, there’s a MIX Boot Camp for you. Learn more about Boot Camps.

clip_image011

See full list of MIX Boot Camp speakers.

 
       

 

clip_image012

clip_image013

Posted: Jan 28 2011, 10:28 AM door Ruud de Jonge | met no comments
Opgeslagen onder: , ,
Be a “Best of Web” Presenter at MIX11
imageAre you an expert on web development, design or monetization? Do you have interesting and unique information to deliver on creating next generation web sites? Submit your session proposal by Friday, January 14, 2011. The MIX content team will select the best proposals, and the MIX community will vote to determine who will present. Presenters will receive 3 nights hotel and a conference pass. Visit the Open Call page for detailed terms and conditions. See last year’s open call presenters and topics.
Save $500 + one night hotel at MIX11 – register by Feb 11

MIX11 registration opens in late January with a special offer for early birds – register by February 11 and save $500 on your conference pass, and receive one free night hotel when you book two or more nights at the Mandalay Bay. Join the MIX email newsletter and be among the first to learn about open registration, special offers, speakers and content for this year’s event.

MIX11 event details

When:

April 12-14, 2011; MIX Boot Camps on April 11

Where:

Mandalay Bay, Las Vegas

Cost:

Full Price Conference Pass - $1395
MIX Boot Camps - $295

More Info:

http://live.visitmix.com/

Posted: Dec 21 2010, 10:52 AM door Ruud de Jonge | met 1 comment(s)
Opgeslagen onder: , ,
Future of Silverlight - Special Event Invite

clip_image002

You’re invited to a very special event on December 2nd, 2010

Learn about the future of Silverlight from Corporate Vice President, Scott Guthrie and other experts, direct from Microsoft’s HQ.

Hear about our plans for the next version of Silverlight, the latest developments as well as in-depth sessions on building applications with Silverlight.

Registration is free – take part in-person or online.

Find out more and Register online

Posted: Nov 15 2010, 11:00 AM door Ruud de Jonge | met no comments
Opgeslagen onder: , , ,
Watch PDC10 via Live Streaming, Oct 28 & 29

PDC10 will be held on the Microsoft campus in Redmond, this October 28th and 29th.  The in-person event is sold out; however, you can still participate online via live and on-demand streaming. 

This year’s announcements will focus on using Microsoft’s developer frameworks and tools to connect your desktops and devices to the next-generation of cloud services.  Steve Ballmer (Microsoft CEO) and Bob Muglia (Microsoft President – Server & Tools) will keynote the event.  Special guest keynoters will be revealed on the day of the broadcast.

The ground-breaking online event will include live streaming of the keynote, as well as concurrent live streaming of all sessions.

  • Live and on-demand streaming will be presented in high-definition (720p) through Silverlight's Smooth Streaming technology.
  • Dual-screen view of speaker and their demos/code, with screen pinning and the ability to tag and bookmark video content.
  • Live, multi-language audio translation and live closed captioning in English.
  • Unprecedented online interaction - inline Twitter client, real-time polling and live Q&A with product teams and experts.

Join in on the excitement starting at 9:00 am PST on October 28th.  No registration is required.  All content is free and available for viewing live and on-demand.  Recorded and presentation content will be available for download approximately 24 hours after recording. 

Start planning your PDC10 schedule today

The PDC session guide is now live.  Browse the sessions and plan your viewing schedule. 

Follow the PDC on Twitter

For the latest event news, follow us on Twitter @PDCEvent. Use the hashtag #PDC10 to share your comments.

clip_image002

About the Microsoft Professional Developers Conference
Since 1991, the Professional Developers Conference (PDC) has been the epicenter of Microsoft’s biggest platform announcements. Sessions are highly technical, and delivered by the technology leaders and teams that conceived and built the technologies.  If you’re an advanced developer, architect or technology leader involved in making strategic technology decisions for your company or organization, you can’t afford to miss the PDC.  Learn more at microsoftpdc.com.

Posted: Oct 21 2010, 12:49 PM door Ruud de Jonge | met no comments
Opgeslagen onder: ,
Stem op Nederlands studententeam wEarth-IT

Vandaag start de People’s Choice Award van softwarecompetitie Imagine Cup 2010

image Schiphol, 8 juni 2010 – Daniëlla, Malissa, Jasper en Johan van de Erasmus Universiteit Rotterdam en TU Delft zullen van 4 tot en met 8 juli Nederland vertegenwoordigen tijdens de wereldwijde finale van de softwarecompetitie van Microsoft, de Imagine Cup. De eerstejaars studenten, team wEarth-IT, wonnen in maart het ticket naar Polen tijdens de landelijke finale.

Naast de reguliere jurybeoordeling tijdens de finale in Polen, kan er vanaf vandaag worden gestemd op het favoriete studententeam via de People’s Choice award. Het team kan door voldoende stemmen deze publieksprijs in de wacht slepen. Stemmen op het Nederlandse studententeam kan via deze site.

De studenten hebben met wEarth-IT een concept ontwikkeld waarmee consumenten doormiddel van een groen productlabel geholpen worden bij de aankoop van groene producten. Door dit label worden producenten gestimuleerd om hun productieproces te verduurzamen. Het team hoopt met wEarth-IT een verschil te maken op het gebied van een duurzaam leefmilieu, millenniumdoel zeven.

Meer dan 325.000 studenten afkomstig van over de hele wereld schreven zich in voor de achtste editie van de softwarecompetitie. De 400 studenten met het beste idee zijn door naar de finale in Polen. De wedstrijd daagt studenten uit om een oplossing te bedenken voor ’s werelds grootste problemen, de acht millenniumdoelen. Het thema is: 'Imagine a world where technology helps solve the toughest problems’.

Volg team wEarth-IT via hun blog, Hyves en Twitter. En stem!

Posted: Jun 08 2010, 11:49 AM door Ruud de Jonge | met 1 comment(s)
Opgeslagen onder: ,
MSF-Agile plus Security Development Lifecycle Process Template for VS 2010

MSF-A+SDL is a TFS process template that incorporates the Security Development Lifecycle (SDL) for Agile process guidance into the MSF Agile development framework. With the MSF-A+SDL template, any code checked into the Visual Studio Team System source repository by the developer is analyzed to ensure that it complies with SDL secure development practices. The template also automatically creates security workflow tracking items for manual SDL processes such as threat modeling to ensure that these important security activities are not accidentally skipped or forgotten.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=812f10ce-bd9a-44e6-b7e6-fd9c3db85d3f

Posted: May 26 2010, 02:42 AM door Ruud de Jonge | met no comments
Opgeslagen onder:
Beveiligingsrapport: cybercrime steeds geavanceerder; Nederland vooral geplaagd door malware

Schiphol, 26 april, 2010 – Cybercriminelen opereren steeds vaker als een traditioneel bedrijf en maken gebruik van nieuwe technieken. Bijvoorbeeld om malware als een product ‘op de markt’ te brengen, compleet met updates en service packs. Dit is een van de bevindingen van het Microsoft Security Intelligence Rapport (SIRv8) dat vandaag verschijnt. In Nederland hebben computergebruikers volgens het rapport vooral last van malware: 6 van de top 10 bedreigingen betreffen malware en 4 zijn potentieel ongewenste software, zoals adware.

image SIRv8 geeft een overzicht van de wereldwijde bedreigingen van de tweede helft van 2009. Een volledige versie hiervan, aanbevelingen van Microsoft en andere informatie is beschikbaar op www.microsoft.com/sir.

Cybercriminelen passen steeds weer hun technieken aan om verschillende doelen effectiever te kunnen aanvallen. SIRv8 geeft bijvoorbeeld aan dat bedrijfsnetwerken vatbaarder zijn voor wormen, terwijl consumenten weer veel vatbaarder zijn voor malware en bedreigingen die gebaseerd zijn op social engineering. Denk aan ‘Nigeriaanse oplichtingsmails’ en kwaadaardige software die zich voordoet als legitieme beveiligingssoftware. Online bedreigingen worden ook steeds vaker verpakt in ‘kits’ voor een maximale impact. Zo bevat de Eleonore browser exploit kit aanvalssoftware voor browsers van verschillende leveranciers. SIRv8 constateert dat aanvallers het nu voornamelijk voor geldelijk gewin doen en zelden alleen opereren. Zij werken vaak met andere criminelen op online zwarte markten om malware kits en toegang tot botnets te kopen en te verkopen. Tot de professionele online bedreigingen behoren ook zogeheten ‘herders’ die gekraakte machines samenvoegen tot een duistere versie van cloud computing voor het wereldwijd verspreiden van spam en malware.

Nederland

Wat betreft het aantal besmettingen met malware, virussen, spyware en andere ongewenste software scoort Nederland in de tweede helft van 2009 ruim onder het gemiddelde. Ten opzichte van de eerste helft van vorig jaar nam het aantal besmettingen af van 4,3 per 1000 pc’s tot 3,3 (dit getal staat voor het aantal computers dat is opgeschoond per 1000 acties van Microsofts Malicious Software Removal Tool).

clip_image002

Het wereldwijde gemiddelde lag in de tweede helft van 2009 op 7,0. De meeste besmettingen kwamen voor in Turkije (20), Brazilië (18) en Spanje (17,1), de minste op Réunion (1,3), gevolgd door Finland (1,4) en in Tunesië (1,4). Van de top 25 ‘families’ van bedreigingen waren er in Nederland 17 malware. De belangrijkste bedreiging was Win32/Renos (op de tweede plaats wereldwijd), verantwoordelijk voor de automatische download van potentieel ongewenste software.

Half miljard

SIRv8 geeft een overzicht van bedreigingen, op basis van gegevens van meer dan een half miljard computers en een diepgaande analyse van deze data in 26 landen, waaronder Nederland. Deze inlichtingen zijn verzameld met behulp van de Malicious Software Removal Tool (MSRT), Forefront Online Protection voor Exchange en Forefront Client Security, Microsoft Security Essentials, Windows Live Hotmail en Bing. De gegevens wijzen uit dat het aantal besmettingen op pc’s met Windows 7 en Windows Vista SP2 de helft minder is dan op pc’s met Windows XP. Een van de belangrijkste methoden van criminelen om hun doel te bereiken is het misbruiken van kwetsbaarheden in software. Door deze kwetsbaarheden snel te verhelpen kan de industrie dit zoveel mogelijk tegengaan.

“Nu er meer beveiligingssoftware beschikbaar is en mensen en leveranciers beveiliging serieus nemen kunnen we met de gemeenschap een beveiliging implementeren voor een veiliger internet dat ook beter te vertrouwen is,” zegt Ruud de Jonge. “Verder raden we dringend aan om alle software up-to-date te houden, gebruik te maken van Microsoft Update voor alle Microsoft-software en om anti-virussoftware van een gerenommeerde leverancier te draaien. Denk bijvoorbeeld aan Microsoft Security Essentials - gratis voor gebruikers met een legitieme Windows-versie.”

Meer info is te vinden op mijn skydrive : https://cid-9a6b06cb3b074239.skydrive.live.com/browse.aspx/SIR%20v8

Posted: Apr 26 2010, 02:57 PM door Ruud de Jonge | met 3 comment(s)
Opgeslagen onder: ,
DevDays 2010 sessies online te bekijken op Channel 9

image

Mega veel content is nu online op Channel 9 in een hoge kwaliteit. Klik op het plaatje of op de volgende link :

http://channel9.msdn.com/tags/DevDays-2010-NL/#Page=1

Alert - Critical Product Vulnerability - March 30, 2010 (Out-of-Band) Microsoft Security Bulletin Release

This alert is to provide you with an overview of the new security bulletin being released (out-of-band) on March 30, 2010.

New Security Bulletin

Microsoft is releasing one new security bulletin (out-of-band) for newly discovered vulnerabilities:

Bulletin ID

Bulletin Title

Maximum Severity Rating

Vulnerability Impact

Restart Requirement

Affected Software

MS10-018

Cumulative Security Update for Internet Explorer (980182)

Critical

Remote Code Execution

Requires a restart

All supported versions of Internet Explorer on supported versions of Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008*, Windows 7, and Windows Server 2008 R2.*

* Where indicated in the Affected Software table on the bulletin Web page, the vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2, when installed using the Server Core installation option. Affected software listed above is an abstract. Please see the bulletin at the link in the left column for complete details.

 

Public Bulletin Webcast

Microsoft will host a webcast to address customer questions on this bulletin:

Title: Information About Microsoft's March 2010 Out-of-Band Security Bulletin Release

Date: Tuesday, March 30, 2010, at 1:00 P.M. Pacific Time (U.S. & Canada).

URL: https://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?culture=en-US&EventID=1032448112

 

Public Resources related to this alert

·         Security Advisory 981374 – Vulnerability in Internet Explorer Could Allow Remote Code Execution:  http://www.microsoft.com/technet/security/advisory/981374.mspx   

·         Microsoft Security Response Center (MSRC) Blog: http://blogs.technet.com/msrc/

·         Microsoft Security Research & Defense (SRD) Blog: http://blogs.technet.com/srd/

·         Microsoft Malware Protection Center (MMPC) Blog: http://blogs.technet.com/mmpc/

·         Microsoft Security Development Lifecycle (SDL) Blog: http://blogs.msdn.com/sdl/

New Security Bulletin Technical Details

In the following tables of affected and non-affected software, software editions that are not listed are past their support lifecycle. To determine the support lifecycle for your product and edition, visit the Microsoft Support Lifecycle Web site at http://support.microsoft.com/lifecycle/.

 

Bulletin Identifier

Microsoft Security Bulletin MS10-018

Bulletin Title

Cumulative Security Update for Internet Explorer (980182)

Executive Summary

This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer.

 

The security update addresses these vulnerabilities by modifying the way that Internet Explorer handles objects in memory, validates input parameters, and filters HTML attributes.

 

This security update also addresses the vulnerability first described in Microsoft Security Advisory 981374.

Affected Software

All supported versions of Internet Explorer on supported versions of Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2*.


* Where indicated in the Affected Software table on the bulletin Web page, the vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2, when installed using the Server Core installation option. Please see the bulletin Web page at the link below for more details.

CVE, Exploitability Index Rating

·         CVE-2010-0267: Uninitialized Memory Corruption Vulnerability (EI = 3)

·         CVE-2010-0488: Post Encoding Information Disclosure Vulnerability (EI = 3)

·         CVE-2010-0489: Race Condition Memory Corruption Vulnerability (EI = 2)

·         CVE-2010-0490: Uninitialized Memory Corruption Vulnerability (EI = 3)

·         CVE-2010-0491: HTML Object Memory Corruption Vulnerability (EI = 1)

·         CVE-2010-0492: HTML Object Memory Corruption Vulnerability (EI = 1)

·         CVE-2010-0494: HTML Element Cross-Domain Vulnerability (EI = 1)

·         CVE-2010-0805: Memory Corruption Vulnerability (EI = 2)

·         CVE-2010-0806: Uninitialized Memory Corruption Vulnerability (EI = 1)

·         CVE-2010-0807: HTML Rendering Memory Corruption Vulnerability (EI = 1)

 

Note: Please see the Exploitability Index table on the bulletin summary page for more details: http://www.microsoft.com/technet/security/bulletin/ms10-mar.mspx

Attack Vectors

·         A maliciously crafted Web page

·         A maliciously crafted HTML e-mail

Mitigating Factors

·         Users would have to be persuaded to visit a malicious Web site.

·         Exploitation only gains the same user rights as the logged-on account.

·         By default, Outlook, Outlook Express, and Windows Mail open HTML e-mail messages in the Restricted Sites zone.

·         By default, IE on Windows 2003 and Windows Server 2008 runs in a restricted mode.

·         IE 5.01 SP4 and IE 8 are not affected by this vulnerability.

Restart Requirement

The update will require a restart.

Bulletins Replaced by This Update

MS10-002

Publicly Disclosed?
Exploited?

CVE-2010-0806 has been publicly disclosed prior to release.

CVE-2010-0806 has been exploited in the wild at release.

Full Details

http://www.microsoft.com/technet/security/bulletin/MS10-018.mspx

 

Regarding Information Consistency

 

We strive to provide you with accurate information in static (this mail) and dynamic (Web-based) content. Microsoft’s security content posted to the Web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft’s Web-based security content, the information in Microsoft’s Web-based security content is authoritative.

 

If you have any questions regarding this alert please contact your Technical Account Manager or Application Development Consultant.

 

Thank you,

 

Microsoft CSS Security Team

 

 

Ruud de Jonge

Director Developer & Platform Evangelism of Microsoft in the Netherlands | Voice: +31-20-5001242

Messenger: ruud_de_jonge@hotmail.com | Blog: http://www.enthusiasm.nl | Visit: Evert van de Beekstraat 354, 1118 CZ Schiphol, NL 

clip_image001 

 

 

Posted: Mar 30 2010, 10:11 PM door Ruud de Jonge | met 1 comment(s)
Opgeslagen onder: ,
Alert for Users of Internet Explorer 6 and 7 : ADVANCE NOTIFICATION - March 30, 2010 (OOB) Microsoft Security Bulletin Release

What is the purpose of this alert?

This is an advance notification of an out-of-band security bulletin that Microsoft is intending to release on March 30, 2010. The bulletin is being released to address attacks against customers of Internet Explorer 6 and Internet Explorer 7. Users of Internet Explorer 8 and Windows 7 are not vulnerable to these attacks.

The vulnerability used in these attacks, along with workarounds, is described in Microsoft Security Advisory 981374.

The out-of-band security bulletin is a cumulative security update for Internet Explorer and will also contain fixes for privately reported vulnerabilities rated Critical on all versions of Internet Explorer that are not related to this attack.

Microsoft continues to encourage customers to follow the Protect Your Computer guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Additional information can be found at www.microsoft.com/protect.

New Bulletin Summary

 

Bulletin Identifier

Internet Explorer

Maximum Severity Rating

Critical

Impact of Vulnerability

Remote Code Execution

Restart Requirement

The update will require a restart.

Affected Software

All supported versions of Internet Explorer on supported versions of Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.

Note: information on affected software listed above is an abstract. Please see the Advance Notification Web page at the link below for complete details.

Although we do not anticipate any changes, the information provided in this summary is  subject to change until the release.

The full version of the Microsoft Security Bulletin Advance Notification for this (OOB) release can be found at http://www.microsoft.com/technet/security/bulletin/ms10-mar.mspx.

Public Bulletin Webcast

 

Microsoft will host a public webcast to address customer questions on these bulletins:

Title: Information about Microsoft March (OOB) Security Bulletin (Level 200)

Date: Tuesday, March 30, 2010, at 1:00 PM Pacific Time (U.S. & Canada).

URL: http://www.microsoft.com/technet/security/bulletin/summary.mspx

 

At this time no additional information on this bulletin, such as details regarding severity or details regarding the vulnerability will be made available until the bulletin is published.

Resources related to this alert

·         Security Advisory 981374 – Vulnerability in Internet Explorer Could Allow Remote Code Execution: http://www.microsoft.com/technet/security/advisory/981374.mspx 

·         Microsoft Security Response Center (MSRC) Blog: http://blogs.technet.com/msrc/

·         Microsoft Security Research & Defense (SRD) Blog: http://blogs.technet.com/srd/

·         Microsoft Malware Protection Center (MMPC) Blog: http://blogs.technet.com/mmpc/

·         Microsoft Security Development Lifecycle (SDL) Blog: http://blogs.msdn.com/sdl/

 

Posted: Mar 29 2010, 09:22 PM door Ruud de Jonge | met no comments
Opgeslagen onder: , ,
.Net Magazine site nu live

Vandaag live gegaan. Alle content uit het .Net Magazine nu live en nog veel meer ! Communities, communities en communities !!!

http://www.dotnetmag.nl/Home

Ik ga naar de DevDays :-)

image

Ook dit jaar ben ik weer bij de DevDays en als ik zo om mij heen kijk is Arie druk bezig met het organiseren van de laatste sessies. Qua programma wordt het meer, meer en oh ja … meer. En natuurlijk zullen wij als eerste in NL aandacht besteden aan development voor Windows Phone 7 gebaseerd op S… en X… (Is nog geheim tot as maandag :-)). En de Geek Night wil je als technologie stuiterbal al helemaal niet missen !

Zie ik je ook in Den Haag op 30 en 31 Maart  ?

http://www.devdays.nl/

Posted: Mar 11 2010, 10:11 AM door Ruud de Jonge | met no comments
Opgeslagen onder: , , ,
Internet Explorer 8 biedt beste bescherming

Internet Explorer 8 biedt de beste bescherming tegen social engineering malware, terwijl andere browsers hopeloos falen. NSS Labs controleerde voor de derde keer hoe goed de vijf populairste browsers van het moment omgaan met kwaadaardige websites die malware aanbieden. Het gaat hier niet om drive-by download exploits, maar om screensavers, codecs en andere applicaties die veilig lijken, maar in werkelijkheid malware bevatten.

NSS Labs performs recurring, standardized testing of web browser security. This includes rating protection against socially-engineered malware and phishing attacks.

Originele artikel : http://nsslabs.com/browser-security

NEW! Q1 2010 Web Browser Comparative Test: Socially-Engineered Malware

This report followed the same Live Testing methodology as the two previous tests conducted in 2009. This report contains empirically-validated evidence gathered during 18 days of 24 x 7 testing, performed every six hours, over 74 discrete test runs, each one adding fresh new malware URLs. Each product was updated to the most current version available at the time testing began, and allowed access to the live Internet.

Tested products include:

  • Apple Safari 4
  • Google Chrome 4
  • Microsoft Internet Explorer 8
  • Mozilla Firefox 3.5
  • Opera 10

Read the Executive Summary.

Read the Full Report.

Met dank aan Security.nl

Posted: Mar 07 2010, 10:18 PM door Ruud de Jonge | met 1 comment(s)
Opgeslagen onder:
Nieuwe Security Development Lifecycle site live …

clip_image001

http://www.microsoft.com/security/sdl/default.aspx

Posted: Feb 07 2010, 10:49 AM door Ruud de Jonge | met no comments
Opgeslagen onder:
Meer posts Volgende pagina »