By Omar Santos Cisco is committed to protecting customers by sharing critical security-related information in different formats. Guided by customer feedback, Cisco’s Product Security Incident Response Team (PSIRT) is seeking ways to improve how we communicate information about Cisco product vulnerabilities to our Customers and Partners. As John Stewart mentioned on his blog post , the Cisco PSIRT has launched a new and improved security vulnerability disclosure format. The new Cisco Security Advisories can be accessed at http://www.cisco.com/go/psirt and at http://cisco.com/security The intent is to make it easier for Customers and Partners to access information about all security vulnerabilities in Cisco products. []

Source:: Cisco Security Notice

By Omar Santos Cisco is committed to protecting customers by sharing critical security-related information in different formats. Guided by customer feedback, Cisco’s Product Security Incident Response Team (PSIRT) is seeking ways to improve how we communicate information about Cisco product vulnerabilities to our Customers and Partners. As John Stewart mentioned on his blog post , the Cisco PSIRT has launched a new and improved security vulnerability disclosure format. The new Cisco Security Advisories can be accessed at http://www.cisco.com/go/psirt and at http://cisco.com/security The intent is to make it easier for Customers and Partners to access information about all security vulnerabilities in Cisco products. []

Source:: Cisco Security Notice

By John Stewart With security threats evolving at a staggering pace, we’re hearing from our customers that their network administrators are often finding it difficult to keep up. They are challenged to make informed decisions quickly enough and prioritize their responses to incoming threats. Not surprising since with each new threat and the related vulnerabilities IT leaders are faced with several questions: Where do I go to find information? Which information is for background and which requires immediate action? What has changed since []

Source:: Cisco Security Notice

By John Stewart With security threats evolving at a staggering pace, we’re hearing from our customers that their network administrators are often finding it difficult to keep up. They are challenged to make informed decisions quickly enough and prioritize their responses to incoming threats. Not surprising since with each new threat and the related vulnerabilities IT leaders are faced with several questions: Where do I go to find information? Which information is for background and which requires immediate action? What has changed since []

Source:: Cisco Security Notice

By Talos Group Vulnerability discovered by Aleksandar Nikolic of Cisco Talos. Post authored by Earl Carter and William Largent Talos is disclosing the discovery of an exploitable buffer overflow vulnerability in the the MiniUPnP library TALOS-2015-0035 (CVE-2015-6031) . The buffer overflow is present in client-side XML parser functionality in miniupnpc. A specially crafted XML response can lead to a buffer overflow, on the stack, resulting in remote code execution. This miniupnpc buffer overflow is present in client-side part of the library. The vulnerable code is triggered by an oversized []

Source:: Cisco Security Notice

By Talos Group Vulnerability discovered by Aleksandar Nikolic of Cisco Talos. Post authored by Earl Carter and William Largent Talos is disclosing the discovery of an exploitable buffer overflow vulnerability in the the MiniUPnP library TALOS-2015-0035 (CVE-2015-6031) . The buffer overflow is present in client-side XML parser functionality in miniupnpc. A specially crafted XML response can lead to a buffer overflow, on the stack, resulting in remote code execution. This miniupnpc buffer overflow is present in client-side part of the library. The vulnerable code is triggered by an oversized []

Source:: Cisco Security Notice

By Mary Ellen Zurko Every once in a while you need to take a step back, and think about the future. Where’s a good place to look for high risk, high opportunity ideas in the future of computer security? New Security Paradigms Workshop (NSPW) is a crystal ball view into the future of cybersecurity. NSPW is an invitation only workshop dedicated to in-depth discussions of radical forward thinking in security research. Here are highlights from a handful of presentations that pursue areas that might be evocative or inspirational []

Source:: Cisco Security Notice

By Mary Ellen Zurko Every once in a while you need to take a step back, and think about the future. Where’s a good place to look for high risk, high opportunity ideas in the future of computer security? New Security Paradigms Workshop (NSPW) is a crystal ball view into the future of cybersecurity. NSPW is an invitation only workshop dedicated to in-depth discussions of radical forward thinking in security research. Here are highlights from a handful of presentations that pursue areas that might be evocative or inspirational []

Source:: Cisco Security Notice

Fujitsu Aktionsmodelle Oktober 2015

 

Auch im Oktober gibt es wieder preiswerte Produkte für den Geschäftseinsatz bei uns. Ob Notebooks, PCs, Displays, Tablets, Server oder Storage – bei Oberberg-Online, Ihrem Fujitsu Select Expert Partner finden Sie Ihre passende Lösung. Egal, ob für den Handwerksbetrieb, den Dienstleister, oder im Bereich Industrie – Oberberg-Online und Fujitsu sind Ihre zuverlässigen Partner für Konzeption, Beschaffung, Implementierung und Betrieb.

Sprechen Sie mit uns unter 02261 915500 oder schreiben Sie uns eine Mail an vertrieb@oberberg.net

Die aktuellen Aktionen können Sie als PDF hier herunterladen:

PCs und Displays

Notebooks und Tablets

Server und Storage

By John Stewart October is National Cyber Security Awareness Month in the United States. This year’s campaign emphasizes cybersecurity as part of a deliberate strategy and a shared responsibility, not just a checkbox item. At Cisco, we believe two key things must change in the security industry. First, we need to acknowledge that security is a strategy, and one that senior leaders in all organizations must embrace and own. Second, IT vendors—and all other vendors that are now embedding information technology in their offerings—must produce products, services and []

Source:: Cisco Security Notice