By Talos Group This post was authored by Jaeson Schultz. Well it’s Microsoft Patch Tuesday, again, and that must mean we are girding our systems against another round of security vulnerabilities. This month Microsoft has released fourteen (14) bulletins covering fifty (50) security vulnerabilities. There are seven bulletins in the set whose severity is considered “Critical”. These “Critical” […]

Source:: Cisco Security Notice

By Josh Reynolds This blog is the first in a 3 part series that will provide an in-depth technical analysis on the H1N1 malware. I’ll be looking at how H1N1 has evolved, its obfuscation, analyzing its execution including new information stealing and user account control bypass capabilities, and finally exploring how we are both using and influencing security tools […]

Source:: Cisco Security Notice

By Josh Reynolds This blog is the first in a 3 part series that will provide an in-depth technical analysis on the H1N1 malware. I’ll be looking at how H1N1 has evolved, its obfuscation, analyzing its execution including new information stealing and user account control bypass capabilities, and finally exploring how we are both using and influencing security tools […]

Source:: Cisco Security Notice

Das klassische ISDN-Telefon ist bald Geschichte. Alle ISDN-Anschlüsse werden auf die IP-Plattform umgestellt. Eine IP-fähige Telefonanlage ist dann Voraussetzung. Das bringt  auch neue Herausforderungen für den Betrieb der geschäftskritischen Telefonie mit sich. Die Telefonanlage benötigt ja ein „Anschlussbeinchen“ ins Internet, mit dem man z.B. komfortabel sein Mobiltelefon als Nebenstelle nutzen kann und auf Anlagenfunktionen auch von zu Hause zugreifen kann. Welche Schutzmechanismen unser Technologie-Partner Innovaphone hierfür in der PBX Version 12 direkt mitbringt, erfahren Sie in unserem neuen Tech-Talk.

 

Source:: Innovaphone

Source:: Innovaphone

By Tom Gilheany A soccer ball without a player is useless. A violin without its musician is just a bit of wood and wire. And a beautiful new security deployment, no matter how advanced, needs skilled people to configure and operate it properly. That deployment must be operating at maximum effectiveness. It also must be tuned to the […]

Source:: Cisco Security Notice

By Tom Gilheany A soccer ball without a player is useless. A violin without its musician is just a bit of wood and wire. And a beautiful new security deployment, no matter how advanced, needs skilled people to configure and operate it properly. That deployment must be operating at maximum effectiveness. It also must be tuned to the […]

Source:: Cisco Security Notice