Vulnerability Deep Dive: Exploiting the Apple Graphics Driver and Bypassing KASLR

By Talos Group Cisco Talos vulnerability researcher Piotr Bania recently discovered a vulnerability in the Apple Intel HD 3000 Graphics driver, which we blogged about here. In this post we are going to take a deeper dive into this research and look into the details of the vulnerability as well as the KASLR bypass and kernel exploitation that […]

Source:: Cisco Security Notice

Vulnerability Deep Dive: Exploiting the Apple Graphics Driver and Bypassing KASLR

By Talos Group Cisco Talos vulnerability researcher Piotr Bania recently discovered a vulnerability in the Apple Intel HD 3000 Graphics driver, which we blogged about here. In this post we are going to take a deeper dive into this research and look into the details of the vulnerability as well as the KASLR bypass and kernel exploitation that […]

Source:: Cisco Security Notice

Tackle the Cybersecurity Problem with a Best Practices Approach

By Steve Caimi It’s late in the day, and the Chief Information Security Officer walks over to you. She asks you a single question: “How do you think about cybersecurity?” The question catches you by surprise. How do I think about cybersecurity? So many things run through your mind at once: Do I think about it in terms […]

Source:: Cisco Security Notice

Tackle the Cybersecurity Problem with a Best Practices Approach

By Steve Caimi It’s late in the day, and the Chief Information Security Officer walks over to you. She asks you a single question: “How do you think about cybersecurity?” The question catches you by surprise. How do I think about cybersecurity? So many things run through your mind at once: Do I think about it in terms […]

Source:: Cisco Security Notice

Privacy takes center stage in security discussions after years of being kept in the background

By Michelle Dennedy With the International Association of Privacy Professionals gathering this week to discuss evolving regulatory requirements and rising customer expectations, there’s no better time to talk about privacy. Privacy is an integral part of the digital transformation wave. As more countries, companies and organizations take advantage of cloud, mobile and data analytics, privacy plays an increasingly […]

Source:: Cisco Security Notice

Privacy takes center stage in security discussions after years of being kept in the background

By Michelle Dennedy With the International Association of Privacy Professionals gathering this week to discuss evolving regulatory requirements and rising customer expectations, there’s no better time to talk about privacy. Privacy is an integral part of the digital transformation wave. As more countries, companies and organizations take advantage of cloud, mobile and data analytics, privacy plays an increasingly […]

Source:: Cisco Security Notice

What is Email Spoofing and How to Detect It

By Kevin Floyd What is Email Spoofing? Email spoofing is the creation of email messages with a forged sender address for the purpose of fooling the recipient into providing money or sensitive information. For example: a sender 401k_Services@yourcompany.com sends a message to your business email address stating that you have one day to log into your account to take […]

Source:: Cisco Security Notice

What is Email Spoofing and How to Detect It

By Kevin Floyd What is Email Spoofing? Email spoofing is the creation of email messages with a forged sender address for the purpose of fooling the recipient into providing money or sensitive information. For example: a sender 401k_Services@yourcompany.com sends a message to your business email address stating that you have one day to log into your account to take […]

Source:: Cisco Security Notice

Howto:Feature List in English

Source:: Innovaphone

Howto:Feature List in English

Source:: Innovaphone