Security Tips & Talk

Tips about computer security, online safety, and privacy

Browse by Tags

  • Blog Post: Microsoft vs. malware: a history

    At 2:00 A.M. on July 13, 2001, Microsoft’s then head of security response got a phone call about a computer worm named “Code Red” that was spreading across computers that connected to the Internet. When the worm quickly spread to hundreds of thousands of computers, Microsoft redoubled...
  • Blog Post: Q & A: Keeping kids safer online

    I recently sat down with Sonia Livingstone , a professor in the Department of Media and Communications at the London School of Economics to discuss children and kids and the Internet. Q. You’ve spent the last two months at Microsoft’s Cambridge research facility. How did that opportunity...
  • Blog Post: When should kids be allowed online?

    As a parent or caregiver, you probably needed only one trip to the playground to realize that children can have radically different styles of play. Just as there’s no “one size fits all” approach to helping children navigate the jungle gym, the way you talk about online safety with...
  • Blog Post: Get advance notice about August 2013 security updates

    Today, the Microsoft Security Response Center (MSRC) posted details about the August security updates . If you have automatic updating turned on, most of these updates will download and install on their own. Sometimes you may need to provide input for Windows Update during an installation. In this...
  • Blog Post: 7 ways to avoid TMI

    Technology can make everything in our lives easier—including sharing too much information (TMI). Just because you can take a picture of your new credit card and post it on Instagram doesn’t mean that you should. In fact, you shouldn’t. Sharing too much information can lead to identity...
  • Blog Post: Online fraud: Get practical advice

    Need help spotting an online scam? Download our new free 12-page booklet called Online Fraud: Your Guide to Prevention, Detection, and Recovery . This guide includes: Real-world examples of false promises made in fake emails Images of scam emails to help you avoid them Tips for guarding...
  • Blog Post: Mobile safety tips for back to school

    Are you sending your child back to school with a mobile phone, laptop, or tablet PC? Director of Microsoft Trustworthy Computing Communications, Jacqueline Beauchere, offers these tips: Set clear use limits for kids on their mobile phones. Lock kids' phones with a personal identification...
  • Blog Post: Security, privacy, and reliability in a connected world

    Microsoft’s Trustworthy Computing corporate vice President Scott Charney shared his security vision for the next decade in his keynote address at the RSA conference today. Charney’s keynote highlighted new and persistent security risks in light of society’s increased dependence on information...
  • Blog Post: Why Trustworthy Computing is still a Microsoft priority

    Ten years ago this week, Bill Gates sent a memo to all Microsoft employees announcing the Trustworthy Computing (TwC) initiative and defining the key aspects of TwC. Gates wrote: “Trustworthy Computing is computing that is as available, reliable and secure as electricity, water services and...
  • Blog Post: Progress made, but still work to do

    In her keynote speech at the RSA Conference in Europe yesterday, Adrienne Hall (General Manager, Microsoft Trustworthy Computing) shared evidence from the latest Microsoft Security Intelligence Report and outlined the progress that Microsoft and others have made in battling botnets . "While we...
  • Blog Post: Microsoft security chief on the future of protecting PCs

    We can increase collective computer security by taking cues from the healthcare industry, argues Scott Charney, Corporate Vice President of Microsoft Trustworthy Computing. Charney outlined this position in a recently published paper entitled Collective Defense: Applying Public Health Models to the...
  • Blog Post: Get all your Trustworthy Computing security and privacy blogs in one place

    The Trustworthy Computing Team at Microsoft recently launched a new blog page that allows you to see all Trustworthy Computing blogs about security and privacy in one place. This new page will make it easier for you to get all the news you need without wasting time searching all over the place. You...
Page 1 of 1 (12 items)