End of Sales für Windows Server 2012R2

Mit dem Jahresende 2017 wird auch der Verkauf von Microsoft Windows Server 2012R2 enden. Auch wenn seit der Einführung von Server 2016 eigentlich keine Notwendigkeit mehr besteht, die Vorgängerversion einzusetzen, liegt der Anteil von Server 2012R2 bei Standardkunden immer noch bei etwa 50% aller neu lizensierten Serversysteme. Unsere Empfehlung: Sofern Sie unbedingt die Version 2012R2 […]

Perspective About the Recent WPA Vulnerabilities

By Omar Santos On October 16th,Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These are protocol-level vulnerabilities that affect wireless vendors providing infrastructure devices and wireless clients, which follow the […]

Perspective About the Recent WPA Vulnerabilities

By Omar Santos On October 16th,Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These are protocol-level vulnerabilities that affect wireless vendors providing infrastructure devices and wireless clients, which follow the […]

Support:IQM Build 8021600 available

Source:: Innovaphone

Support:IQM Build 8021600 available

Source:: Innovaphone

Threat Round Up for Oct 6 – Oct 13

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 6 and October 13. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our […]

Threat Round Up for Oct 6 – Oct 13

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 6 and October 13. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our […]