Network Security

Network Security news, trend analysis and opinion

Trojan program based on ZeuS targets 150 banks, can hijack webcams

The new Chthonic Trojan borrows features from ZeuS and several of its spinoffs, researchers from Kaspersky Lab said

Critical vulnerability in Git clients puts developers at risk

Malicious Git code repositories can execute rogue commands on client machines interacting with them


Vulnerability in embedded Web server exposes millions of routers to hacking

Attackers can take control of millions of routers by sending a specially crafted request to RomPager, an embedded Web server running on them

Point-of-sale malware creators still in business with Spark, an Alina spinoff

Spark is installed by a script written in AutoIt and scrapes card data from the memory of POS terminals

security lock

Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014

The security of the web itself was tested in unprecedented ways in 2014--but the news isn't all bad.

ICANN data compromised in spearphishing attack

Staff email credentials and some user data, including email and postal addresses, were taken

Google's work on full encryption chugs along, with Yahoo's help

Code has been migrated to GitHub to foster involvement from the wider tech community

NAC Renaissance

Mobile devices, cloud computing, and security concerns are driving increasing use of granular network access controls.

Phishing for passwords.

ICANN: data breaches not due to new top-level domains

An ICANN spokesman dismissed accusations that the recent growth in the number of generic top-level domains has caused data breaches, on Thursday.

How to bridge and secure air gap networks

The state of the art on Air Gap networks is changing with both better protective technologies and sneakier threats that take advantage of some very elegant and extreme hacks.

Cisco Acquires Neohapsis: A Sign of the Times

Security services firm can help Cisco support customers, capitalize on growing services opportunities, and pull product sales

01 the year ahead

The biggest challenges faced by CIOs/CISOs heading into 2015

As the year winds to a close, CIOs and CISOs are faced with a number of challenges heading into 2015. CSO recently heard from several experts about the topic, each offering their opinion on what they feel would be the most important...

patch ie

Microsoft takes slow, cautious path to protecting IE against POODLE

Microsoft yesterday added an optional anti-POODLE defense to Internet Explorer 11 (IE11), and promised that additional protection would be switched on by default in two months.

breach bucket

IT and end users are far apart on critical data access

End users have access to a lot more sensitive data than IT departments think they do, says a new Ponemon survey

The Turla espionage operation also infected Linux systems with malware

A newly identified Linux backdoor program is tied to the Turla cyberespionage campaign, researchers from Kaspersky Lab said

Forgotten subdomains boost risk of account hijacking, other attacks

Some sites have subdomains pointed at old domains that have long expired and can be registered by attackers

The POODLE flaw returns, this time hitting TLS security protocol

HTTPS website owners advised to check their websites again

Attackers knock PlayStation Network offline for hours

The Lizard Squad, a group that carried out a similar attack against the Sony service in August, took credit for the downtime

Vodafone blocks Chaos Computer Club site, fueling 'Net censorship concerns in UK

Over-blocking is a common issue with Internet filters run by ISPs in the U.K., digital rights group says

CISOs Should Become Proactive and Influential in SDN Planning, Deployment, and Strategy

Networking team will take the lead but security professionals should participate and provide input

Load More