Locations

United States Change All Microsoft Sites

Search

Current Edition

SIR Volume 14: July- December 2012
This download contains two sections: 1) Running unprotected: Measuring the benefits of real-time security software 2) Worldwide Threat Assessment.

Key Findings

A summary of the analysis and conclusions for SIR volume 14.

Download a section:

Featured Articles

Previous Editions

Measuring Benefits of Real-Time Security Software
This article illustrates how installing real-time security software from a reputable vendor and keeping it up to date is one of the most important steps to reduce exposure to malware.

Deceptive Downloads: software, music, and movies
Provides information of how attackers take advantage of unsecure supply chains to distribute malware to victims around the world.

How Conficker Continues to Propagate
Provides information on why Conficker is a serious threat and what organizations can do to protect themselves.

Determined Adversaries and Targeted Attacks
Delivers insight into advanced persistent threats (APT) against organizations, governments, and individuals.

The Evolution of Malware and the Threat Landscape
This special edition of the SIR provides summarized information about how malware has evolved over the last 10 years.

TeliaSonera case study
European telecom company uses Microsoft security data to remove Botnet devices from its network.

Zeroing In on Malware Propagation Methods
This featured article for volume 11 covers classifying malware methods, user interaction insights, and provides analysis details.

Volume 13: January - June 2012

Volume 12: July - December 2011

Volume 11: January - June 2011

Volume 10: January - December 2010

Volume 9: January - June 2010

Volume 8: July - December 2009

Volume 7: January - June 2009

Volume 6: July - December 2008

Volume 5: January - June 2008

Volume 4: July - December 2007

Volume 3: January - June 2007

Volume 2: July - December 2006

Volume 1: January - June 2006