Network Security

Network Security news, trend analysis and opinion

Cyberespionage group launches sophisticated phishing attacks against Outlook Web App users

The group targeted military agencies, embassies, defense contractors and media organizations, researchers from Trend Micro said

DNS is ubiquitous and it's easily abused to halt service or steal data

DNS may be absolutely fundamental to the way the Internet works, but it was never designed with security in mind. Here are four ways that attackers and cyber thieves are exploiting the Internet's plumbing to deny service and steal...


Facebook and Yahoo prevent use of recycled email addresses to hijack accounts

A new mechanism helps email servers determine if a message was intended for a recycled account's previous owner

Enterprises Establish a 'Cybersecurity Cavalry'

As expert group gains status and budget, large organizations are moving away from the status quo.

Abandoned subdomains pose security risk for businesses

Attackers could hijack subdomains pointed by companies at external services they no longer use, researchers say

Massive malvertising campaign on Yahoo, AOL and other sites delivers ransomware

The malicious ads exploited vulnerabilities to install the CryptoWall ransomware on computers, researchers from Proofpoint said

Android ransomware 'Koler' turns into a worm, spreads via SMS

The Koler ransomware locks the device screen and displays fake messages from police agencies

One week after patch, Flash vulnerability already exploited in large-scale attacks

The Fiesta exploit kit bundles an exploit for the CVE-2014-0569 vulnerability in Flash Player, researchers found

Researcher creates proof-of-concept worm for network-attached storage devices

Infecting NAS devices with malware can be very valuable for attackers, a researcher said

Yet another Proofpoint for Network and Endpoint Security Integration

Network/Endpoint integration initiatives gaining traction at advanced organizations driven by threat management and security analyst teams

New technique allows attackers to hide stealthy Android malware in images

The attack could be used to distribute malware through applications that appear harmless, researchers said

Hackers strike defense companies through real-time ad bidding

Malicious advertisements are being 'micro-targeted' at defense companies, Invincea said

Ransom note

A tale of Ransomware that will make your blood run cold ...

Ransomware that holds your data hostage unless you pay up is real and dangerous to your network's health ... here's a tale of what happened to one company

FBI director calls for greater police access to communications

Apple and Google should also rethink their plans to enable smartphone encryption by default, he says

All-in-one printers can be used to control infected air-gapped systems from far away

Researchers have developed Morse code for transmitting data via pulses of light sent to an operating scanner

Telco Systems lays groundwork for fewer management worries with virtual routers, firewalls

The company's platform lets service providers offer virtual router and firewalls

Security experts warn of 'POODLE' attack against SSL 3.0

Experts say that SSL 3.0 should be disabled even though some legacy products still use it

Security vendors claim progress against Chinese group that hacked Google

A collaborative effort has resulted in better defenses against the "Operation Aurora" hackers

YouTube served malicious advertisements, Trend Micro says

The advertisements redirected victims to the Sweet Orange exploit kit, which tries to install malware

'Hurricane Panda' hackers used Microsoft zero-day, CrowdStrike says

The group, which targets technology infrastructure companies, is believed to be linked to China's government

Load More