Security Tips & Talk
Tips about computer security, online safety, and privacy
Search this blog
Search all blogs
View More Blogs
Microsoft Accessibility Blog
Microsoft Malware Protection Center Blog
Microsoft Security Blog
Security Tips & Talk Blog
Trustworthy Computing Blog
Safety & Security Center
Consumer Security Support Center
Security Tips & Talk
Browse by Tags
advance fee fraud
Advance Notification Service
Data Privacy Day
Digital Crimes Unit
fake security software
Family Online Safety Institute
Internet Explorer 10
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Malicious Software Removal Tool
microsoft lottery fraud
Microsoft Safety Scanner
Microsoft Security Essentials
monthly security updates
National Cyber Security Alliance (NCSA)
rogue security software
security intelligence report
Windows Live Hotmail
Windows Live OneCare
Windows Live Safety Scanner
Windows Phone 7
Microsoft vs. malware: a history
At 2:00 A.M. on July 13, 2001, Microsoft’s then head of security response got a phone call about a computer worm named “Code Red” that was spreading across computers that connected to the Internet. When the worm quickly spread to hundreds of thousands of computers, Microsoft redoubled...
5 Mar 2014
Q & A: Keeping kids safer online
Kim Sanchez, Director of Trustworthy Computing
I recently sat down with Sonia Livingstone , a professor in the Department of Media and Communications at the London School of Economics to discuss children and kids and the Internet. Q. You’ve spent the last two months at Microsoft’s Cambridge research facility. How did that opportunity...
23 Jan 2014
When should kids be allowed online?
As a parent or caregiver, you probably needed only one trip to the playground to realize that children can have radically different styles of play. Just as there’s no “one size fits all” approach to helping children navigate the jungle gym, the way you talk about online safety with...
9 Aug 2013
Get advance notice about August 2013 security updates
Today, the Microsoft Security Response Center (MSRC) posted details about the August security updates . If you have automatic updating turned on, most of these updates will download and install on their own. Sometimes you may need to provide input for Windows Update during an installation. In this...
8 Aug 2013
7 ways to avoid TMI
Technology can make everything in our lives easier—including sharing too much information (TMI). Just because you can take a picture of your new credit card and post it on Instagram doesn’t mean that you should. In fact, you shouldn’t. Sharing too much information can lead to identity...
23 Jul 2013
Online fraud: Get practical advice
Need help spotting an online scam? Download our new free 12-page booklet called Online Fraud: Your Guide to Prevention, Detection, and Recovery . This guide includes: Real-world examples of false promises made in fake emails Images of scam emails to help you avoid them Tips for guarding...
22 Nov 2012
Mobile safety tips for back to school
Are you sending your child back to school with a mobile phone, laptop, or tablet PC? Director of Microsoft Trustworthy Computing Communications, Jacqueline Beauchere, offers these tips: Set clear use limits for kids on their mobile phones. Lock kids' phones with a personal identification...
4 Sep 2012
Security, privacy, and reliability in a connected world
Microsoft’s Trustworthy Computing corporate vice President Scott Charney shared his security vision for the next decade in his keynote address at the RSA conference today. Charney’s keynote highlighted new and persistent security risks in light of society’s increased dependence on information...
28 Feb 2012
Why Trustworthy Computing is still a Microsoft priority
Ten years ago this week, Bill Gates sent a memo to all Microsoft employees announcing the Trustworthy Computing (TwC) initiative and defining the key aspects of TwC. Gates wrote: “Trustworthy Computing is computing that is as available, reliable and secure as electricity, water services and...
17 Jan 2012
Progress made, but still work to do
In her keynote speech at the RSA Conference in Europe yesterday, Adrienne Hall (General Manager, Microsoft Trustworthy Computing) shared evidence from the latest Microsoft Security Intelligence Report and outlined the progress that Microsoft and others have made in battling botnets . "While we...
14 Oct 2010
Microsoft security chief on the future of protecting PCs
We can increase collective computer security by taking cues from the healthcare industry, argues Scott Charney, Corporate Vice President of Microsoft Trustworthy Computing. Charney outlined this position in a recently published paper entitled Collective Defense: Applying Public Health Models to the...
6 Oct 2010
Get all your Trustworthy Computing security and privacy blogs in one place
The Trustworthy Computing Team at Microsoft recently launched a new blog page that allows you to see all Trustworthy Computing blogs about security and privacy in one place. This new page will make it easier for you to get all the news you need without wasting time searching all over the place. You...
4 Aug 2009
Page 1 of 1 (12 items)
© 2014 Microsoft Corporation.
Privacy & Cookies