Network Security

Network Security news, trend analysis and opinion

Enterprises Establish a 'Cybersecurity Cavalry'

As expert group gains status and budget, large organizations are moving away from the status quo.

Abandoned subdomains pose security risk for businesses

Attackers could hijack subdomains pointed by companies at external services they no longer use, researchers say


Massive malvertising campaign on Yahoo, AOL and other sites delivers ransomware

The malicious ads exploited vulnerabilities to install the CryptoWall ransomware on computers, researchers from Proofpoint said

Android ransomware 'Koler' turns into a worm, spreads via SMS

The Koler ransomware locks the device screen and displays fake messages from police agencies

One week after patch, Flash vulnerability already exploited in large-scale attacks

The Fiesta exploit kit bundles an exploit for the CVE-2014-0569 vulnerability in Flash Player, researchers found

Researcher creates proof-of-concept worm for network-attached storage devices

Infecting NAS devices with malware can be very valuable for attackers, a researcher said

Yet another Proofpoint for Network and Endpoint Security Integration

Network/Endpoint integration initiatives gaining traction at advanced organizations driven by threat management and security analyst teams

New technique allows attackers to hide stealthy Android malware in images

The attack could be used to distribute malware through applications that appear harmless, researchers said

Hackers strike defense companies through real-time ad bidding

Malicious advertisements are being 'micro-targeted' at defense companies, Invincea said

Ransom note

A tale of Ransomware that will make your blood run cold ...

Ransomware that holds your data hostage unless you pay up is real and dangerous to your network's health ... here's a tale of what happened to one company

FBI director calls for greater police access to communications

Apple and Google should also rethink their plans to enable smartphone encryption by default, he says

All-in-one printers can be used to control infected air-gapped systems from far away

Researchers have developed Morse code for transmitting data via pulses of light sent to an operating scanner

Telco Systems lays groundwork for fewer management worries with virtual routers, firewalls

The company's platform lets service providers offer virtual router and firewalls

Security experts warn of 'POODLE' attack against SSL 3.0

Experts say that SSL 3.0 should be disabled even though some legacy products still use it

Security vendors claim progress against Chinese group that hacked Google

A collaborative effort has resulted in better defenses against the "Operation Aurora" hackers

YouTube served malicious advertisements, Trend Micro says

The advertisements redirected victims to the Sweet Orange exploit kit, which tries to install malware

'Hurricane Panda' hackers used Microsoft zero-day, CrowdStrike says

The group, which targets technology infrastructure companies, is believed to be linked to China's government

Dropbox dismisses claims of hack affecting 7 million accounts

The credentials leaked by an alleged hacker online were likely stolen from other services, the company said

Russian hackers exploit Windows zero-day flaw to target Ukraine, US organizations

The vulnerability allows for arbitrary code execution and affects many versions of Windows and Windows Server

What you should consider when choosing a password manager

Password managers offer many convenient options, but some come at the expense of security

Load More