Vulnerability Spotlight: Windows 10 Remote Denial of Service

By Talos Group Talos is releasing an advisory for a remote denial of service attack vulnerability in Microsoft Windows 10 AHCACHE.SYS. An attacker can craft a malicious portable executable file, which if accessed causes AHCACHE.SYS to attempt to access out of scope memory. This triggers a bugcheck in the Windows kernel causing the system to crash, denying service […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Windows 10 Remote Denial of Service

By Talos Group Talos is releasing an advisory for a remote denial of service attack vulnerability in Microsoft Windows 10 AHCACHE.SYS. An attacker can craft a malicious portable executable file, which if accessed causes AHCACHE.SYS to attempt to access out of scope memory. This triggers a bugcheck in the Windows kernel causing the system to crash, denying service […]

Source:: Cisco Security Notice

Transforming Endpoint Security

By Tom Stitt It’s been said before, but this bears repeating. On average, it takes organizations 100 days1 or more to detect a breach after it occurs. On average. This means attackers often have more than three months to examine an organization’s data and then steal what they want. Clearly, this is not effective. These attacks ultimately target […]

Source:: Cisco Security Notice

Transforming Endpoint Security

By Tom Stitt It’s been said before, but this bears repeating. On average, it takes organizations 100 days1 or more to detect a breach after it occurs. On average. This means attackers often have more than three months to examine an organization’s data and then steal what they want. Clearly, this is not effective. These attacks ultimately target […]

Source:: Cisco Security Notice

botfrei.de – kostenlose G DATA App für Android

Immer mehr mobile Geräte sind Opfer von Schadsoftware. In Kooperation mit seinem Mitgliedsunternehmen G DATA bieter der eco-Verband auf der Webseite www.botfrei.de eine kostenlose EU-Cleaner App für Android Geräte an.

Der Botfrei EU Cleaner Mobile ist ein kostenfreier Ersthelfer, der im Falle einer Malware-Infektion hilft, Schadprogramme wie z.B. Viren, Trojaner oder Spyware auf einem mobilen Android-Gerät zu erkennen und sicher zu entfernen. Zusätzlich bietet der Botfrei EU Cleaner Mobile einen Phishing-Schutz, der den Zugriff auf gefährliche und manipulierte Webseiten blockiert.

Nach Ablauf des 30-tägigen Tests wechselt die App automatisch in die dauerhaft kostenfreie Version. Mit dieser Vollversion stehen weiterhin Schutz vor Viren und Schadsoftware zur Verfügung. Darüber hinaus können weitere Sicherheitsfunktionen, wie Diebstahlschutz, Kindersicherung oder SMS/Anruf-Filter als kostenpflichtige jederzeit dazu gebucht werden. Der neue EU-Cleaner ist ab sofort im Google Play Store erhältlich.

Ein weiteres höchst aktuelles Thema wird auf der Seite botfrei.de auch beleuchtet: Ransomware ist insbesondere in 2016 häufig in den Nachrichten aufgetaucht, verschlüsselte Festplatten und Server sind für viele Anwender zum Problem geworden. Informationen zum Thema Ransomware und Links zu bekannten Entschlüsselungs-Tools findet man auf der Themenseite hier.

2016-10-13_10h02_39

 

Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net
DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net

Sundown EK: You Better Take Care

By Talos Group This post was authored by Nick Biasini Over the last six months the exploit kit landscape has seen some major changes. These changes began with Nuclear ceasing operations in April/May and arrests in Russia coinciding with the end of Angler in June. Recently, Neutrino has been added to the list of exploit kits that have […]

Source:: Cisco Security Notice

Sundown EK: You Better Take Care

By Talos Group This post was authored by Nick Biasini Over the last six months the exploit kit landscape has seen some major changes. These changes began with Nuclear ceasing operations in April/May and arrests in Russia coinciding with the end of Angler in June. Recently, Neutrino has been added to the list of exploit kits that have […]

Source:: Cisco Security Notice

The Evolution of Scoring Security Vulnerabilities: The Sequel

By Omar Santos Back in April, I wrote a blog post about the new version of the Common Vulnerability Scoring System (CVSS). The changes made for CVSSv3 addressed some of the challenges that existed in CVSSv2. For example, CVSSv3 analyzes the scope of a vulnerability and identifies the privileges an attacker needs to exploit it. The CVSSv3 enhancements […]

Source:: Cisco Security Notice

The Evolution of Scoring Security Vulnerabilities: The Sequel

By Omar Santos Back in April, I wrote a blog post about the new version of the Common Vulnerability Scoring System (CVSS). The changes made for CVSSv3 addressed some of the challenges that existed in CVSSv2. For example, CVSSv3 analyzes the scope of a vulnerability and identifies the privileges an attacker needs to exploit it. The CVSSv3 enhancements […]

Source:: Cisco Security Notice

National Cybersecurity: A Collaborative Approach is Required

By Edna Conway As we wrap up National Cybersecurity Awareness Month in the U.S., cybersecurity continues to be a top-of-mind issue for business, government and consumers alike. In February 2016, President Obama announced a Cybersecurity National Action Plan to improve the United States‘ cybersecurity posture. The non-partisan Commission on Enhancing National Cybersecurity was created and charged with making […]

Source:: Cisco Security Notice