Trace Id is missing

Unlock your potential with Microsoft Copilot

Get things done faster and unleash your creativity with the power of AI anywhere you go.
Microsoft Copilot app being utilized to generate pictures of a singing dog, assisting to identify a flower, and helping to generate an email to congratulate a coworker on a promotion.

Microsoft Security Intelligence Report volume 12 (July - December 2011)

This is the twelfth volume of the Microsoft Security Intelligence Report.

Important! Selecting a language below will dynamically change the complete page content to that language.

  • Version:

    1.0

    Date Published:

    4/24/2012

    File Name:

    Microsoft_Security_Intelligence_Report_Volume_12_Determined_Adversaries_And_Targeted_Attacks_English.pdf

    Microsoft_Security_Intelligence_Report_Volume_12_English.pdf

    Microsoft_Security_Intelligence_Report_Volume_12_How_Conficker_Continues_To_Propagate_English.pdf

    Microsoft_Security_Intelligence_Report_Volume_12_Infographic.pdf

    Microsoft_Security_Intelligence_Report_Volume_12_Key_Findings_Summary_English.pdf

    Microsoft_Security_Intelligence_Report_Volume_12_Regional_Threat_Assessment_English.pdf

    Microsoft_Security_Intelligence_Report_Volume_12_Worldwide_Threat_Assessment_English.pdf

    File Size:

    532.6 KB

    3.3 MB

    435.0 KB

    1.5 MB

    723.8 KB

    9.0 MB

    3.0 MB

    Volume 12 of the Microsoft® Security Intelligence Report provides an in-depth perspective on malicious and potentially unwanted software, software exploits, security breaches and software vulnerabilities (both in Microsoft software and in third-party software). Microsoft developed these perspectives based on detailed analysis over the past several years, with a focus on the second half of 2011.
  • Supported Operating Systems

    Windows 2000, Windows 7, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP

    Any supported Operating System
  • Download the full SIR, Worldwide Threat Assessment, Key Findings Summary and Regional Threat Assessments. All are available as a PDF.
Follow Microsoft