Tech-Channel – Innovaphone MyPBX Mobil #15

Mobilität ist heutzutage das A und O für moderne Unternehmen. Mit der innovaphone PBX ist es möglich, die verschiedenen PBX-Leistungsmerkmale selbst von Smartphones aus über flexible Mobile Clients zu nutzen. Mobile Mitarbeiter, die häufig unterwegs oder auf Geschäftsreise sind, können auf diese Weise von überall aus die gewohnten IP Telefonie Funktionalitäten per Smartphone nutzen. Die Innovaphone myPBX gibt es als App für iOS und Android.

A Key Ingredient Organizations Need to Combat Advanced Cyber Threats

By Sanjay Kumar CFOs, and their technical counterparts, are leading board-room level strategic information security decisions. This isn’t a surprise. A recent Accenture study noted that 75 percent of CFOs are “getting in the driver seat” regarding technology investment decisions. Flexibility, in regards to both financial and technical considerations, is critical to a successful security strategy. CFOs are […]

Source:: Cisco Security Notice

A Key Ingredient Organizations Need to Combat Advanced Cyber Threats

By Sanjay Kumar CFOs, and their technical counterparts, are leading board-room level strategic information security decisions. This isn’t a surprise. A recent Accenture study noted that 75 percent of CFOs are “getting in the driver seat” regarding technology investment decisions. Flexibility, in regards to both financial and technical considerations, is critical to a successful security strategy. CFOs are […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Remote Code Execution Vulnerabilities Within Lexmark Perceptive Document Filters.

By Talos Group Vulnerabilities discovered by Tyler Bohan & Marcin Noga of Cisco Talos. Talos are today releasing three new vulnerabilities discovered within the Lexmark Perceptive Document Filters library. TALOS-2016-0172, TALOS-2016-0173 and TALOS-2016-0183 allow for a remote code execution using specifically crafted files. These vulnerabilities are present in the Lexmark Document filter parsing engine which is used across […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Remote Code Execution Vulnerabilities Within Lexmark Perceptive Document Filters.

By Talos Group Vulnerabilities discovered by Tyler Bohan & Marcin Noga of Cisco Talos. Talos are today releasing three new vulnerabilities discovered within the Lexmark Perceptive Document Filters library. TALOS-2016-0172, TALOS-2016-0173 and TALOS-2016-0183 allow for a remote code execution using specifically crafted files. These vulnerabilities are present in the Lexmark Document filter parsing engine which is used across […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Rockwell Automation MicroLogix 1400 SNMP Credentials Vulnerability

By Talos Group This vulnerability was discovered by Patrick DeSantis. Description Talos recently discovered a vulnerability in Allen-Bradley Rockwell Automation MicroLogix 1400 Programmable Logic Controllers (PLCs) related to the default configuration that is shipped with devices running affected versions of firmware. This vulnerability is due to the presence of an undocumented SNMP community string that could be leveraged […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Rockwell Automation MicroLogix 1400 SNMP Credentials Vulnerability

By Talos Group This vulnerability was discovered by Patrick DeSantis. Description Talos recently discovered a vulnerability in Allen-Bradley Rockwell Automation MicroLogix 1400 Programmable Logic Controllers (PLCs) related to the default configuration that is shipped with devices running affected versions of firmware. This vulnerability is due to the presence of an undocumented SNMP community string that could be leveraged […]

Source:: Cisco Security Notice

Cisco’s Knack for NAC – Cisco ISE Receives Frost & Sullivan Market Leadership Award

By Dan Stotts Infrastructure is aging, networks are expanding, and more devices are connecting. The Cisco 2016 Midyear Cybersecurity Report finds that attackers are remaining active and undetected for weeks, months, or even longer by taking advantage of well-known vulnerabilities that organizations should have addressed long ago. It isn’t unusual to find organizations using software and systems with […]

Source:: Cisco Security Notice

Cisco’s Knack for NAC – Cisco ISE Receives Frost & Sullivan Market Leadership Award

By Dan Stotts Infrastructure is aging, networks are expanding, and more devices are connecting. The Cisco 2016 Midyear Cybersecurity Report finds that attackers are remaining active and undetected for weeks, months, or even longer by taking advantage of well-known vulnerabilities that organizations should have addressed long ago. It isn’t unusual to find organizations using software and systems with […]

Source:: Cisco Security Notice

G DATA Ratgeber – Was ist eigentlich ein Hoax?

Haben Sie eine solche Nachricht auch schon einmal bekommen? „Ein Virus steckt Ihre Festplatte in Brand.“ „Mark Zuckerberg verschenkt sein Vermögen.“ „Nur, wenn Sie diese Info weiterleiten, können Sie Ihren Messenger auch in Zukunft kostenlos nutzen.“ Hierbei handelt es sich um sogenannte Hoaxes – das sind digitale Kettenbriefe, deren meist reißerische Inhalte reine Falschmeldungen sind.

2016-07-27_11h57_02

Wer hat nicht auch schon den immer wieder aufgewärmten facbook-Post gesehen, in dem der Nutzer der Verwendung seiner Daten und Fotos widerspricht? Alles vergebene Liebesmüh´.

Unser Technologie-Partner G DATA zeigt in diesem Artikel, was Hoaxes sind, woran man sie erkennt, wie gefährlich sie sind und was man dagegen unternehmen kann.

Bei Fragen zu unseren G DATA Sicherheitslösungen aus Deutschland stehen wir gerne zur Verfügung:

DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net