Dangerous Clipboard: Analysis of the MS15-072 Patch
1 min read
This post was authored by Marcin Noga with contributions from Jaeson Schultz. Have you ever thought about how security researchers take a patch that has been released, and then reverse it to find the underlying security issue? Well, back In July Microsoft released security bulletin MS15-072, titled: “Vulnerability in Windows Graphics Component Could Allow Elevation […]
Connected Analytics: Learn to Live on the Edge – and Love It!
4 min read
Not surprisingly, as a networking company Cisco frequently publishes predictions on the growth of Internet traffic. Bragging unintended, typically the forecasts are pretty accurate. In a 2012 report we predicted that by 2017 there would be 2.5 devices and related connections for every person on earth, while there would be 5 devices and related connections […]
Apple iOS 8 and MAC Randomization: What It means for Cisco’s Connected Mobile Experiences (CMX) Solution
2 min read
As you may have read, Apple's iOS 8 will come with some changes to the way MAC addresses are exposed in Wi-Fi probe requests. Apple’s intent was to...
Attack Analysis with a Fast Graph
3 min read
This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, […]
Angling for Silverlight Exploits
6 min read
This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering. Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we have […]
Big Data in Retailing: Follow the Money!
2 min read
Retailers looking at the Big Data opportunity may well find themselves with an array of choices: the opportunities seem so vast, where does one begin? Well, a pragmatic way forward is to focus on some pragmatic possibilities and then “follow the money”! In examining the Big Data opportunity for retailers, Cisco IBSG has identified three […]