Einschränkung der Auswahl
Alle Artikel aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2008/2009
oder nur Artikel des
• Entwickler Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2008-2010
alle (lang!)
• Mobile Technology aus
2019
2016
2015
2014
2012/2013
alle (lang!)
• PHP Magazin / PHP User aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2009/2010
alle (lang!)
• windows.developer / dot.Net Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2008-2011
alle (lang!)
• oder der anderen Magazine
Windows Developer 11.15 - Office in der Cloud - und die Sicherheit?
Im
windows.developer 11.15
ist ein Artikel zur Sicherheit von Office 365 erschienen.
Links
- [1] Graham Cluley: "Don't call it 'the cloud'. Call it 'someone else's computer'"
- [2] Zack Whittaker; ZDNet: "Microsoft admits Patriot Act can access EU-based cloud data"
- [3] Brad Smith; Microsoft on the Issues: "New success in protecting customer rights unsealed today"
- [4] Joseph Ax; Reuters: "U.S. judge rules search warrants extend to overseas email accounts"
- [5] Brad Smith; Microsoft on the Issues: "WSJ opinion by Brad Smith: We’re fighting the feds over your email"
- [6] Mike Masnick; Techdirt: "No, Microsoft Is Not Suddenly 'Defying' A Court Order To Turn Over Emails"
- [7] Brad Smith; Microsoft on the Issues: "What if? Microsoft appeal ponders U.S. reaction to foreign data demand"
- [8] Brad Smith; Microsoft on the Issues: "Our legal challenge to a US government search warrant"
- [9] Rich Lundeen, Jesse Ou; Black Hat Abu Dhabi 2011: "New Ways I'm Going to Hack Your Web App"
- [10] Justin Hendricks; DefCon 21: "So You Think Your Domain Controller is Secure?"
- [11] Ronny L. Bull, Jeanna N. Matthews; DefCon 23: "Exploring Layer 2 Network Security in Virtualized Environments"
(Material dazu)
- [12] Sophia D'Antoine; Black Hat USA 2015: "Exploiting Out-of-Order Execution for Covert Cross-VM Communication"
- [13] Erik Peterson; Black Hat Europe 2014: "Bringing a Machete to the Amazon"
- [14] Andres Riancho; Black Hat USA 2014: "Pivoting in Amazon Clouds"
- [15] Shobhit Sahay; Microsoft Office Blogs: "Introducing Office 365 Message Encryption: Send encrypted emails to anyone!"
- [16] Shobhit Sahay; Microsoft Office Blogs: "One-Time Passcode for Office 365 Message Encryption"
- [17] Brad Smith; The Official Microsoft Blog: "Protecting customer data from government snooping"
- [18] Carsten Eilers: "Heute aufgezeichnet – morgen entschlüsselt?"; PHP Magazin 5.2014
- [19] Paul Andrew; Microsoft Office Blogs: "Multi-Factor Authentication for Office 365"
- [20] Rajesh Jha; Microsoft Office Blogs: "Enterprise-grade cloud services: a high bar required for security, compliance, and privacy"
- [21] Vijay Kumar; Microsoft Office Blogs: "Office 365—Our latest innovations in security and compliance"
- [22] Shobhit Sahay; Microsoft Office Blogs: "Office everywhere, encryption everywhere"
- [23] Rajesh Jha; Microsoft Office Blogs: "Enhancing transparency and control for Office 365 customers"
- [24] Vijay Kumar; Microsoft Office Blogs: "Announcing Customer Lockbox for Office 365"
- [25] Scott Charney; The Official Microsoft Blog: "Enabling greater transparency and control"
- [26] Outlook Team; Microsoft Office Blogs: "New access and security controls for Outlook for iOS and Android"
- [27] Office 365 Team; Microsoft Office Blogs: "Enhancing mail flow security for Exchange Online"
- [28] Alan Byrne; Cogmotive Reports Blog: "Vulnerability in Office 365 allows unauthorised Administrator access"
- [29] Omar Shahine; The OneDrive Blog: "Update for OneDrive and Office.com shared links"
- [30] Chang Kawaguchi, Travis Rhodes, Vijay Kumar; Microsoft Office Blogs:"From Inside the Cloud: What does Microsoft do to prepare for emerging security threats to Office 365?"
- [31] Carsten Eilers: "Die 0-Day-Exploits 2013 im Überblick"
- [32] Carsten Eilers: "Die 0-Day-Exploits 2014 im Überblick"
- [33] Carsten Eilers: "Die 0-Day-Exploits 2015 im Überblick"
- [34] Nart Villeneuve, Joshua Homan; FireEye Threat Research Blog: "A New Word Document Exploit Kit"
- [35] Naked Security writer; Sophos Naked Security: "Microsoft Word Intruder - the malware that writes new malware for you"
- [36] Alden Pornasdoro; Microsoft Malware Protection Center: "Before you enable those macros…"
- [37] Graham Chantry; Sophos Naked Security: "From the Labs: New developments in Microsoft Office malware"
- [38] Abraham Camba; TrendLabs Security Intelligence Blog: "Beware the "Insert and Link" Feature in Microsoft Office"
- [39] Lisa Vaas; Sophos Naked Security: "Microsoft scans email for child abuse images, leads to arrest?"
- [40] Lee Munson; Sophos Naked Security: "Microsoft admits reading blogger's Hotmail as part of leak investigation"