Network Security

Network Security news, trend analysis and opinion

Data Security

Aorato's directory services application firewall protects Active Directory from attack and abuse

Enterprise directory services are vulnerable to attack and insider abuse. What cyber criminal would not want access to the central system that contains all identity, authentication and authorization data? Now there is a directory...


Phishing key

Why it is time to intensify employee education on phishing

Companies should consider intensifying employee training to combat the increasing craftiness of phishers who are working harder to obtain personal details on targets in order to trap them in scams.

NIST taking input for mobile security guidelines

A new NIST publication aims to alert enterprises of potential security dangers within commercial apps

The UPS Store says malware found on systems of 51 stores

Names, postal and email addresses and payment card data may have been exposed

'Reveton' ransomware upgraded with powerful password stealer

Avast thinks its controllers are trying to diversify after profits have fallen

shutterstock 203588131

Yes, medical device security is lousy - so what?

There is no debate that the cyber security built into medical devices is practically nonexistent. But there is debate over how much that puts patients at risk. On one side are experts who say the benefits far outweigh the minuscule...

Google broadens its malware sleuthing to sniff out deceptive downloads

More types of malicious software will be identified by Google's safe browsing service

New Gameover Zeus botnet keeps growing, especially in the US

A new Gameover Zeus malware variant has infected over 10,000 systems so far, researchers say

The biggest iPhone security risk could be connecting one to a computer

Design quirks allow malware to be installed on iOS devices and cookies to be plucked from Facebook and Gmail apps

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

The flaws could allow attackers to access data stored on BlackBerry phones or sensitive credentials logged on servers

Users should patch critical flaw in Adobe Reader and Acrobat, researchers say

Adobe also releases critical updates for Flash Player and AIR

Malware is less concerned about virtual machines

Symantec finds most malware doesn't quit if it runs on VM, which used to be a sign it was being analyzed

Fifteen new vulnerabilities reported during router hacking contest

Five popular router models were hacked during the SOHOpelessly Broken competition at DefCon 22

Many home routers supplied by ISPs can be compromised en masse, researchers say

Some ISP servers used to manage routers provisioned to customers can be hacked from the Internet, researchers from Check Point said

Some mobile POS devices still affected by critical flaws months after patch

Security researchers demonstrated that they can completely compromise such devices by using programmable smart cards

MAB Example

MAB with Non-Cisco Switches

Blog describing MAC Authentication Bypass (MAB), and how to integrate Non-Cisco Switches with Cisco Identity Services Engine (ISE) for MAB.

Oracle issues a virtual strongbox for enterprise encryption keys

Oracle Key Vault provides a central repository for storing enterprise encryption keys

Carriers' remote control software continues to put some mobile devices at risk

Security researchers have identified serious vulnerabilities in carrier-mandated remote management software installed on mobile devices

Google lowers search ranking of websites that don't use encryption

The move is intended to promote better security practices across the Web

Load More