Vulnerability Spotlight: LibreOffice RTF Vulnerability
By Talos Group Vulnerability discovered by Aleksandar Nikolic of Cisco Talos. Talos is disclosing the presence of CVE-2016-4324 / TALOS-CAN-0126, a Use After Free vulnerability within the RTF parser of LibreOffice. The vulnerability lies in the parsing of documents containing both stylesheet and superscript tokens. A specially crafted RTF document containing both a stylesheet and […]
Better Security Through Openness and Multi-Vendor Integration
By Scott Pope Cisco Further Expands Technology Partner Ecosystem – New Partners and New Tech Integration Areas Security is an interconnected system, not a bunch of disparate boxes. Like a school of fish, security should operate collaboratively to accomplish a goal. Not just for the sake of “integration”, but because the very nature of securing […]
Better Security Through Openness and Multi-Vendor Integration
By Scott Pope Cisco Further Expands Technology Partner Ecosystem – New Partners and New Tech Integration Areas Security is an interconnected system, not a bunch of disparate boxes. Like a school of fish, security should operate collaboratively to accomplish a goal. Not just for the sake of “integration”, but because the very nature of securing […]
Innovaphone V12 Specials 2016 – UC kaufen – WebRTC dazu bekommen
Innovaphone V12 Specials 2016 – UC kaufen – WebRTC dazu bekommen Mit der Software-Version 12 wird unter dem Motto „New Devices. New Services. More Security“ die innovaphone PBX um etliche Produkte und Produktdetails erweitert. Im Zuge dessen bietet innovaphone bis Ende September 2016 eine Reihe attraktiver Angebote. Steigen Sie jetzt ein und und lernen Sie […]
Vorsicht – Locky ist wieder da
Vorsicht – Locky ist wieder da Eigentlich kommt ja am Freitag von uns des öfteren ein eher lustiger Post, aber heute müssen wir das leider in Form einer Warnung vornehmen: Sicherheitsforscher von Proofpoint haben eine erneute Welle von E-Mails beobachtet, die den Erpressungstrojaner Locky verbreitet. Nachdem im Mai das Botnetz Necurs die Verbreitung aus nicht […]
Connected Value Chains: The Pervasive Security Imperative
By Edna Conway We can no longer debate the reality of digital disruption and its impact on each of us in all we do, at work, at home and at play. Today’s challenge is to embrace the connected world and address security on a comprehensive continuum to ensure its optimum impact. To do this, we […]
Connected Value Chains: The Pervasive Security Imperative
By Edna Conway We can no longer debate the reality of digital disruption and its impact on each of us in all we do, at work, at home and at play. Today’s challenge is to embrace the connected world and address security on a comprehensive continuum to ensure its optimum impact. To do this, we […]