Network Security

Network Security news, trend analysis and opinion

Mobile security: A mother lode of new tools

You may know your smartphone, but pretty soon the question will be: How well does your smartphone know you?

Portnox NAC offers complete control, including over BYOD and cloud

Cloud computing, mobile computing and especially BYOD are bringing a new urgency to Network Access Control (NAC). Portnox offers a solution that reduces cost and complexity so organizations can deploy NAC in every branch location for...


Android vulnerability allows malware to compromise most devices and apps

Attackers can impersonate trusted developers to gain powerful privileges on the OS, researchers from Bluebox Security said

Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness

Attackers are targeting Amazon EC2 instances with Elasticsearch 1.1.x installed

Russian government offers money for identifying Tor users

The Russian Ministry of Interior announced a contract for research on obtaining information about Tor users and their systems

Arrests made after international cyber-ring targets StubHub

StubHub accounts were compromised and used to buy tickets for popular events, which were then resold

Thousands of sites compromised through WordPress plug-in vulnerability

Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress

BYOD morphs from lockdown to true mobility

Four companies that have been at BYOD for a while talk about how their programs have changed with the times.

File-encrypting Android ransomware 'Simplocker' targets English-speaking users

The malware was updated to use FBI-themed alerts and encrypt backup files, researchers from ESET said

BlackBerry offers BES10 as a hosted service through partners

Businesses wanting the security of BlackBerry Enterprise Service 10 without the complexity of managing it onsite can now buy it as a hosted service from six BlackBerry partners.

Virtru launches business email encryption service for Google Apps

The service, which allows for fine administrator control of messaging, is free to try through later this year

Open Wireless Router firmware aims for better router security, network performance

The new custom router firmware will allow users to share their wireless networks, but could also improve their router's security

EFF releases Chrome, Firefox plugin to block third-party tracking

One feature aims to stop tracking tied to clicking the Facebook 'like' on outside sites

Tor Project working to fix weakness that can unmask users

The anonymity software's developers believe they've identified the problem

ransom ware

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

The Cryptolocker takedown led to a better designed, more resilient ransomware threat

Net neutrality a key battleground in growing fight over encryption, activists say

Both carriers and government now have an interest in how users keep their online lives private

Home router security to be tested in upcoming hacking contest

Researchers will compete to exploit previously unknown vulnerabilities in popular home routers

Romanian gang used malware to defraud international money transfer firms

The cybercriminals targeted money transfer franchises in several European countries

Aloha point-of-sale terminal, sold on eBay, yields security surprises

An HP researcher's findings highlight ongoing problems with POS software and hardware

Vulnerability exposes some Cisco home wireless devices to hacking

Specially crafted HTTP requests could trigger remote code execution on the affected devices, Cisco said

Load More