Cisco Coverage for ‘GRIZZLY STEPPE’

By Talos Group Over the past several weeks, there have been ongoing discussions regarding cyber attacks that have occurred against several political, governmental, and private sector entities in the United States. These discussions have revolved around allegations that these cyber attacks were designed to interfere with the 2016 U.S. Federal Elections as well as identifying […]

Cisco Coverage for ‘GRIZZLY STEPPE’

By Talos Group Over the past several weeks, there have been ongoing discussions regarding cyber attacks that have occurred against several political, governmental, and private sector entities in the United States. These discussions have revolved around allegations that these cyber attacks were designed to interfere with the 2016 U.S. Federal Elections as well as identifying […]

Fortinet to Announce Fourth Quarter and Full Year 2016 Financial Results

Fortinet to Announce Fourth Quarter and Full Year 2016 Financial Results Source:: Fortinet

Fortinet to Announce Fourth Quarter and Full Year 2016 Financial Results

Fortinet to Announce Fourth Quarter and Full Year 2016 Financial Results Source:: Fortinet

Ende des Supports für PHP 5

Ende des Supports für PHP 5 Zum Jahresende 2016 endete auch der Support für PHP 5. Für die letzte Version 5.6 werden noch Sicherheitsupdates veröffentlicht, alle älteren Versionen erhalten keinerlei Unterstützung mehr und sollten dringend ersetzt werden. Die laufende Version 7 wurde bereits Ende 2015 eingeführt und wird aktiv weiter entwickelt und unterstützt, so dass […]

G DATA Bedrohungsprognose 2017

G DATA Bedrohungsprognose 2017 Gleich zum Jahresstart wollen wir zwar keine Angst verbreiten, Sie aber mit der G DATA Bedrohungsprognose 2017 für die Risiken im IT-Umfeld sensibilisieren. Im letzten Jahr sind viele Anwender und Unternehmen Opfer von Verschlüsselungstrojanern geworden und haben entweder wertvolle Daten verloren, oder sogar Lösegeld gezahlt. Aufgrund der Einfachheit und der lukrativen […]

The impact on network security through encrypted protocols – HTTP/2

By Tobias Mayer This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet, mainly TCP with HTTP 1.1, have shown that they cannot deal with today’s requirements […]