H1N1: Technical analysis reveals new capabilities
By Josh Reynolds This blog is the first in a 3 part series that will provide an in-depth technical analysis on the H1N1 malware. I’ll be looking at how H1N1 has evolved, its obfuscation, analyzing its execution including new information stealing and user account control bypass capabilities, and finally exploring how we are both using […]
H1N1: Technical analysis reveals new capabilities
By Josh Reynolds This blog is the first in a 3 part series that will provide an in-depth technical analysis on the H1N1 malware. I’ll be looking at how H1N1 has evolved, its obfuscation, analyzing its execution including new information stealing and user account control bypass capabilities, and finally exploring how we are both using […]
Tech-Channel – Innovaphone Reverse Proxy #16
Das klassische ISDN-Telefon ist bald Geschichte. Alle ISDN-Anschlüsse werden auf die IP-Plattform umgestellt. Eine IP-fähige Telefonanlage ist dann Voraussetzung. Das bringt auch neue Herausforderungen für den Betrieb der geschäftskritischen Telefonie mit sich. Die Telefonanlage benötigt ja ein „Anschlussbeinchen“ ins Internet, mit dem man z.B. komfortabel sein Mobiltelefon als Nebenstelle nutzen kann und auf Anlagenfunktionen auch von […]
Why Cisco Is an Essential Partner in Cyber Ops: PART 1
By Tom Gilheany A soccer ball without a player is useless. A violin without its musician is just a bit of wood and wire. And a beautiful new security deployment, no matter how advanced, needs skilled people to configure and operate it properly. That deployment must be operating at maximum effectiveness. It also must be […]
Why Cisco Is an Essential Partner in Cyber Ops: PART 1
By Tom Gilheany A soccer ball without a player is useless. A violin without its musician is just a bit of wood and wire. And a beautiful new security deployment, no matter how advanced, needs skilled people to configure and operate it properly. That deployment must be operating at maximum effectiveness. It also must be […]