Hacker News
- Cisco Leap Frogs H.264 Video Collaboration with Real-Time AV1 Codec https://blogs.cisco.com/collaboration/cisco-leap-frogs-h-264-video-collaboration-with-real-time-av1-codec 55 comments
- Threat Spotlight: TeslaCrypt – Decrypt It Yourself http://blogs.cisco.com/security/talos/teslacrypt 10 comments
- How the Internet of Everything Will Change the World…for the Better http://blogs.cisco.com/news/how-the-internet-of-everything-will-change-the-worldfor-the-better-infographic/ 6 comments
- Cisco backs down, drops cloud from default router settings http://blogs.cisco.com/home/update-answering-our-customers-questions-about-cisco-connect-cloud-2/ 12 comments
- Cisco and AWS Collaborate to Accelerate Innovation https://blogs.cisco.com/news/accelerate-innovation 3 comments aws
- Delivering 1 Gbps over DSL with Cisco’s ISR 1000 https://blogs.cisco.com/enterprise/delivering-1-gbps-over-dsl-with-ciscos-isr-1000 4 comments hardware
- Cisco UCS goes AMD Epyc and rack / New UCS multi-node server tackles growing need for high performance, scale-out infrastructure https://blogs.cisco.com/datacenter/new-ucs-multi-node-server-tackles-growing-need-for-high-performance-scale-out-infrastructure 28 comments hardware
- FDA announces first-ever recall of a medical device due to cyber risk https://blogs.cisco.com/healthcare/fda-announces-first-ever-recall-of-a-medical-device-due-to-cyber-risk 4 comments technology
- TALOS Vulnerability Spotlight: Multiple Vulnerabilities in the CPP and Parity Ethereum Client https://blogs.cisco.com/security/talos/vulnerability-spotlight-multiple-vulnerabilities-in-the-cpp-and-parity-ethereum-client?utm_source=dlvr.it&utm_medium=twitter 9 comments ethereum
- The Shadow Brokers EPICBANANAS and EXTRABACON Exploits https://blogs.cisco.com/security/shadow-brokers 5 comments sysadmin
- The Shadow Brokers EPICBANANAS and EXTRABACON Exploits https://blogs.cisco.com/security/shadow-brokers 17 comments netsec
- Introducing Cisco HyperFlex Systems http://blogs.cisco.com/datacenter/introducing-cisco-hyperflex-systems 11 comments sysadmin
- Cryptowall 4 – The Evolution Continues http://blogs.cisco.com/security/talos/cryptowall-4-the-evolution-continues 22 comments netsec
- Cisco UCS C3260 - 512 TB RAM and 360 TB Disk with 4 x 40 Gbps of IO throughput http://blogs.cisco.com/datacenter/life-in-the-fast-lane-the-new-cisco-ucs-c3260-rack-server 12 comments sysadmin
- When Does Software Start Becoming Malware? http://blogs.cisco.com/security/talos/infinity-toolkit 37 comments sysadmin
- Malware Meets SysAdmin – Automation Tools Gone Bad http://blogs.cisco.com/talos/sysadmin-phish 6 comments netsec
- Thor, a royalty free video codec initiative, announced http://blogs.cisco.com/collaboration/world-meet-thor-a-project-to-hammer-out-a-royalty-free-video-codec 5 comments technews
- Your Files Are Encrypted with a “Windows 10 Upgrade” - Latest Ransomware scam http://blogs.cisco.com/security/talos/ctb-locker-win10 33 comments sysadmin
- Ding! Your RAT has been delivered! http://blogs.cisco.com/security/talos/darkkomet-rat-spam 3 comments netsec
- Trojanized PuTTY Software http://blogs.cisco.com/security/trojanized-putty-software 17 comments netsec
- Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors http://blogs.cisco.com/talos/rombertik 3 comments netsec
- TeslaCrypt – Decrypt It Yourself http://blogs.cisco.com/talos/teslacrypt 61 comments netsec
- PoSeidon A Deep Dive Into Point of Sale Malware http://blogs.cisco.com/security/talos/poseidon 4 comments netsec
- Hundreds of Thousands of Google Apps Domains’ Private WHOIS Information Disclosed http://blogs.cisco.com/security/talos/whoisdisclosure 35 comments sysadmin
- Malicious PNGs: What You See Is Not All You Get! http://blogs.cisco.com/talos/malicious-pngs 8 comments netsec
- Bad Browser Plug-ins Gone Wild: Malvertising, Data Exfiltration, and Malware, Oh my! http://blogs.cisco.com/talos/bad-browser-plug-ins 6 comments netsec
- Cryptowall 3.0: Back to the Basics http://blogs.cisco.com/security/talos/cryptowall-3-0 16 comments netsec
- Angler Exploit Kit Using Flash 0-Day http://blogs.cisco.com/talos/angler-variants 4 comments netsec
- Ransomware on Steroids: Cryptowall 2.0 http://blogs.cisco.com/security/talos/cryptowall-2 12 comments netsec
- Wiper Malware – A Detection Deep Dive http://blogs.cisco.com/security/talos/wiper-malware 3 comments netsec
- Steganography & Reversing Multilayer .NET Malware http://blogs.cisco.com/talos/reversing-multilayer-net-malware 5 comments netsec
- Threat Spotlight: “Kyle and Stan” Malvertising Network Threatens Windows and Mac Users With Mutating Malware http://blogs.cisco.com/security/kyle-and-stan/ 5 comments netsec
- Major IE vulnerability http://blogs.cisco.com/security/ie-zero-day-and-vgx-dll/ 10 comments sysadmin
- Open-Sourced H.264 Removes Barriers to WebRTC http://blogs.cisco.com/collaboration/open-source-h-264-removes-barriers-webrtc 17 comments webdev
- Open-Sourced H.264 Removes Barriers to WebRTC http://blogs.cisco.com/collaboration/open-source-h-264-removes-barriers-webrtc 23 comments linux
- Open-Sourced H.264 Removes Barriers to WebRTC http://blogs.cisco.com/collaboration/open-source-h-264-removes-barriers-webrtc 42 comments opensource
- Introducing Kvasir: Penetration test-driven data management http://blogs.cisco.com/security/introducing-kvasir/ 10 comments netsec
- The MPI C++ bindings: what happened, and why? http://blogs.cisco.com/performance/the-mpi-c-bindings-what-happened-and-why/ 6 comments cpp
- Huawei and Cisco’s Source Code: Correcting the Record http://blogs.cisco.com/news/huawei-and-ciscos-source-code-correcting-the-record/ 29 comments netsec
- The Internet of Things [INFOGRAPHIC] http://blogs.cisco.com/wp-content/uploads/internet_of_things_infographic_3final.jpg 351 comments technology