Network Security

Network Security news, trend analysis and opinion

Portnox NAC offers complete control, including over BYOD and cloud

Cloud computing, mobile computing and especially BYOD are bringing a new urgency to Network Access Control (NAC). Portnox offers a solution that reduces cost and complexity so organizations can deploy NAC in every branch location for...

BYOD morphs from lockdown to true mobility

Four companies that have been at BYOD for a while talk about how their programs have changed with the times.


Thousands of sites compromised through WordPress plug-in vulnerability

Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress

Arrests made after international cyber-ring targets StubHub

StubHub accounts were compromised and used to buy tickets for popular events, which were then resold

BrandPost Brocade

Internet of Overwhelming Things

As the era of Internet of Things (IoT) dawned, the fridge got hacked. Well, maybe not.

File-encrypting Android ransomware 'Simplocker' targets English-speaking users

The malware was updated to use FBI-themed alerts and encrypt backup files, researchers from ESET said

BlackBerry offers BES10 as a hosted service through partners

Businesses wanting the security of BlackBerry Enterprise Service 10 without the complexity of managing it onsite can now buy it as a hosted service from six BlackBerry partners.

Tor Project working to fix weakness that can unmask users

The anonymity software's developers believe they've identified the problem

Virtru launches business email encryption service for Google Apps

The service, which allows for fine administrator control of messaging, is free to try through later this year

BrandPost Brocade

Against All Odds

No doubt, there are consumers of data center services who share my despair over getting access to the unrestricted wonders enabled by ongoing innovations in social, mobile, cloud and big data. IDC has dubbed those innovations

ransom ware

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

The Cryptolocker takedown led to a better designed, more resilient ransomware threat

EFF releases Chrome, Firefox plugin to block third-party tracking

One feature aims to stop tracking tied to clicking the Facebook 'like' on outside sites

Open Wireless Router firmware aims for better router security, network performance

The new custom router firmware will allow users to share their wireless networks, but could also improve their router's security

Romanian gang used malware to defraud international money transfer firms

The cybercriminals targeted money transfer franchises in several European countries

Enterprise architects challenged to manage data explosion

Read this whitepaper to find out how Red Hat Storage Server can allow enterprises to quickly and confidently deliver business applications that minimize cost, complexity, and risk while increasing architectural flexibility.

Net neutrality a key battleground in growing fight over encryption, activists say

Both carriers and government now have an interest in how users keep their online lives private

Home router security to be tested in upcoming hacking contest

Researchers will compete to exploit previously unknown vulnerabilities in popular home routers

Aloha point-of-sale terminal, sold on eBay, yields security surprises

An HP researcher's findings highlight ongoing problems with POS software and hardware

Vulnerability exposes some Cisco home wireless devices to hacking

Specially crafted HTTP requests could trigger remote code execution on the affected devices, Cisco said

CIOs strive to harness Big Data while keeping an eye on the bottom line

Read this whitepaper to learn how Red Hat Storage Server allows CIOs to confidently support business growth, manage cost and risk, capitalize on emerging technologies, and drive future innovation across their organizations.

U.S. malware share rising, Amazon service No.1 in hosting it

Solutionary’s Top 10 list also includes Google and Akamai.

There's almost a million fake apps targeting your phone

Trend MIcro finds hundreds of thousands of fake Android apps in trawl of online stores, forums

SSL Blacklist project exposes certificates used by malware

Researchers launch effort to track SSL certificates used in botnet and malware operations

Google sets up cybercrime-busting task force

After unearthing the Heartbleed flaw, Google sets up a research group dedicated to finding vulnerabilities in Web software

Load More