Network Security

Network Security news, trend analysis and opinion

Cybercrime group steals millions from Russian banks, targets US and European retailers

The group compromised computer networks and ATMs operated by financial institutions, as well as point-of-sale terminals

South Korea nuclear operator runs drill after alleged hacker threat

Government launched probe but says leaked data does not threaten safety


Exploits for dangerous network time protocol vulnerabilities can compromise systems

Systems administrators are urged to install critical patches that address remote code execution flaws in NTP

Staples says hack may have compromised 1 million-plus payment cards

The attack hit stores in 35 states from California to Connecticut

Trojan program based on ZeuS targets 150 banks, can hijack webcams

The new Chthonic Trojan borrows features from ZeuS and several of its spinoffs, researchers from Kaspersky Lab said

Critical vulnerability in Git clients puts developers at risk

Malicious Git code repositories can execute rogue commands on client machines interacting with them

Vulnerability in embedded Web server exposes millions of routers to hacking

Attackers can take control of millions of routers by sending a specially crafted request to RomPager, an embedded Web server running on them

Point-of-sale malware creators still in business with Spark, an Alina spinoff

Spark is installed by a script written in AutoIt and scrapes card data from the memory of POS terminals

security lock

Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014

The security of the web itself was tested in unprecedented ways in 2014--but the news isn't all bad.

ICANN data compromised in spearphishing attack

Staff email credentials and some user data, including email and postal addresses, were taken

Google's work on full encryption chugs along, with Yahoo's help

Code has been migrated to GitHub to foster involvement from the wider tech community

NAC Renaissance

Mobile devices, cloud computing, and security concerns are driving increasing use of granular network access controls.

Phishing for passwords.

ICANN: data breaches not due to new top-level domains

An ICANN spokesman dismissed accusations that the recent growth in the number of generic top-level domains has caused data breaches, on Thursday.

How to bridge and secure air gap networks

The state of the art on Air Gap networks is changing with both better protective technologies and sneakier threats that take advantage of some very elegant and extreme hacks.

Cisco Acquires Neohapsis: A Sign of the Times

Security services firm can help Cisco support customers, capitalize on growing services opportunities, and pull product sales

01 the year ahead

The biggest challenges faced by CIOs/CISOs heading into 2015

As the year winds to a close, CIOs and CISOs are faced with a number of challenges heading into 2015. CSO recently heard from several experts about the topic, each offering their opinion on what they feel would be the most important...

patch ie

Microsoft takes slow, cautious path to protecting IE against POODLE

Microsoft yesterday added an optional anti-POODLE defense to Internet Explorer 11 (IE11), and promised that additional protection would be switched on by default in two months.

breach bucket

IT and end users are far apart on critical data access

End users have access to a lot more sensitive data than IT departments think they do, says a new Ponemon survey

The Turla espionage operation also infected Linux systems with malware

A newly identified Linux backdoor program is tied to the Turla cyberespionage campaign, researchers from Kaspersky Lab said

Forgotten subdomains boost risk of account hijacking, other attacks

Some sites have subdomains pointed at old domains that have long expired and can be registered by attackers

Load More