By Talos Group ‘Magic Hound‘ is the code name used to reference a seemingly limited series of malware distribution campaigns that were observed targeting organizations in Saudi Arabia as well as organizations with business interests in Saudi Arabia. Similar to other malware distribution campaigns that Talos has observed and documented, this series of campaigns made use of phishing […]

Source:: Cisco Security Notice

By Talos Group ‘Magic Hound‘ is the code name used to reference a seemingly limited series of malware distribution campaigns that were observed targeting organizations in Saudi Arabia as well as organizations with business interests in Saudi Arabia. Similar to other malware distribution campaigns that Talos has observed and documented, this series of campaigns made use of phishing […]

Source:: Cisco Security Notice

Ende des Supports für folgende Innovaphone-Modelle

Wichtig für alle Innovaphone Kunden: Ab der neuen PBX Version 12r2 werden folgende Geräte nicht mehr unterstützt, da diese nicht über genügend Speicher verfügen:

IP-Telefone:

  • – IP110
  • – IP200A
  • – IP230
  • – IP240

Nicht betroffen davon sind die IP-Telefone IP110A und IP240A. Diese werden auch in Version 12r2 unterstützt.

Gateways:

  • – IP2000
  • – IP6000

Für die folgenden Gateways wird ab Version 12r2 keine PBX-Funktionalität mehr unterstützt:

  • – IP302
  • – IP305
  • – IP800

Das kann insbesondere zu Problemen bei der anstehenden All-IP Umstellung der Telekom führen, denn aktuelle SIP-Profile werden nur für aktuelle Firmwarestände bereitgestellt. Kunden, die noch ältere Gateways betreiben, sollten reagieren und sich mit uns zwecks eines Upgrade-Angebotes auf die neue Gerätegeneration unterhalten. Wir unterstützen Sie gerne:

DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net

Sebastian Lutz

lutz@oberberg.net

Dirk Zurawski
02261 9155051
zurawski@oberberg.net

By Talos Group Discovered by Tyler Bohan of Cisco Talos Overview Talos is disclosing TALOS-2016-0262 (CVE-2017-2372) and TALOS-2017-0275 (CVE-2017-2374), an out of bounds write vulnerability in Apple GarageBand. GarageBand is a music creation program, allowing users to create and edit music easily and effectively from their Mac computer. GarageBand is installed by default on all Mac computers so […]

Source:: Cisco Security Notice

By Talos Group Discovered by Tyler Bohan of Cisco Talos Overview Talos is disclosing TALOS-2016-0262 (CVE-2017-2372) and TALOS-2017-0275 (CVE-2017-2374), an out of bounds write vulnerability in Apple GarageBand. GarageBand is a music creation program, allowing users to create and edit music easily and effectively from their Mac computer. GarageBand is installed by default on all Mac computers so […]

Source:: Cisco Security Notice

By Tobias Mayer This post is the second part of my series around the impact of encrypted protocols on network security. You can find the first article about HTTP/2 here: http://blogs.cisco.com/security/the-impact-on-network-security-through-encrypted-protocols-http2 Now let us focus on the new and upcoming specification of TLS 1.3. It is important to understand what advantages TLS 1.3 brings to us, but also […]

Source:: Cisco Security Notice

By Tobias Mayer This post is the second part of my series around the impact of encrypted protocols on network security. You can find the first article about HTTP/2 here: http://blogs.cisco.com/security/the-impact-on-network-security-through-encrypted-protocols-http2 Now let us focus on the new and upcoming specification of TLS 1.3. It is important to understand what advantages TLS 1.3 brings to us, but also […]

Source:: Cisco Security Notice

FUJITSU Aktionsmodelle Februar 2017

Auch im kürzesten Monat des Jahres gibt es wieder frische Aktionsmodelle unseres Technologie-Partners FUJITSU. Besonderes Augenmerk sollten Sie auf die brandneuen FUJITSU Ultrabooks legen (U727, U747 und U757). Auch für das Stylistic Tablet R726 gibt es eine aktuelle Aktion, in der Sie das Docking-Cradle zum Kauf on top erhalten!

Alle Aktionsmodelle aus dem Bereich mobile Endgeräte finden Sie in diesem Flyer.

Stationäre Arbeitsplätze und Monitore sind hier als Aktionsmodelle verfügbar.

Zum Netz gehören selbstverständlich die passenden Server und Speicherlösungen, die hier zu finden sind.

Wie immer sind dies nur Konfigurationsvorschläge. Auf Ihre Anforderung abgestimmte Systeme erhalten Sie von uns:

DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net

By Jason Lamar Many pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of the crime emerges, which in the case of a serial killer often includes his or her MO or method of operation. In the cyber world, […]

Source:: Cisco Security Notice

By Jason Lamar Many pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of the crime emerges, which in the case of a serial killer often includes his or her MO or method of operation. In the cyber world, […]

Source:: Cisco Security Notice