Network Security

Network Security news, trend analysis and opinion

Russian hackers uses Flash, Windows zero-day flaws

APT 28 reused some of the same infrastructure and encryption keys, FireEye said

RSA Conference Should Push For Technology Integration

Since cybersecurity software architecture has become an enterprise requirement, the RSA Conference should take a more proactive role in promoting technology integration


Pawn Storm cyberespionage group increases activity, targets NATO

New attacks were observed this year from the group, including against people with links to the White House

Whistleblowers at risk when using US government websites

The ACLU is recommending that more than two dozen websites be upgraded to use encryption

IBM opens up its threat data as part of new security intelligence sharing platform

The IBM X-Force Exchange platform will allow companies to share and compare data from security incidents

New malware program Punkey targets point-of-sale systems

All signs point to an increase in the number of memory scraping malware programs infecting PoS terminals to steal payment card data

Why 'designed for security' is a dubious designation

Recent events suggest that pushing enhanced privacy- and security wares brings risks with few rewards

VMware helps CIOs tunnel their way to more secure mobile apps

VMware's goal is to make it easier for administrators to control what apps and resources mobile users can access

attack

A true story of combating a large-scale DDoS attack

Every website is subject to cyberattack. The difference is in how you plan for the threat and how your infrastructure is able to alert and respond

Web app attacks, PoS intrusions and cyberespionage leading causes of data breaches

Phishing attacks continue to be effective, but mobile threats are not a big concern, according to a Verizon report

Threat Intelligence Sharing Momentum and Needs

Government and infosec industry should build upon threat intelligence energy by focusing on education, standards use-cases, and best practices

Chinese hacker group among first to target networks isolated from Internet

APT 30 has been operating since 2005 without significantly changing its attack methods, FireEye said

White Lodging Services confirms second payment card breach

Security measures put in place after a first breach last year failed to stop hackers from striking again

Amazon offers network file storage in the cloud

Watch out NetApp! Amazon is coming after the NAS storage market

Use of Windows XP makes European ATMs vulnerable to malware attacks

While malware is a concern, skimming is still the main problem in Western Europe ATM fraud

Police operation disrupts Beebone botnet used for malware distribution

The U.S. has the largest number of computers infected with Beebone

Islamist hackers take French broadcaster TV5Monde off air

The attack disrupted the network's broadcasting for hours and also affected its websites and social media accounts

Encryption startup Vera locks down transferred documents

The company's software applies a strict regime of rules over who can open a file

Large-scale Google malvertising campaign hits users with exploits

A Google ad reseller in Bulgaria was potentially compromised

Anticipating RSA 2015

Focus on threat detection/response, endpoints, threat intelligence, IAM, cloud, and SDN

Load More