Network Security

Network Security news, trend analysis and opinion

Cleaning up botnets takes years, if ever, to complete

The cleanup effort around Conficker shows how hard it is to eradicate a botnet

Yahoo tackles large 'malvertising' campaign in its ad network

Ads with malicious code may have appeared across Yahoo's sites


00 title

A secure employee departure checklist

What steps should a business take when an employee is leaving the company in order to minimize threats to your data? Here's a checklist to securely see departing employees out the door

neiman marcus exterior

Neiman Marcus case a reminder to check your cyber coverage

In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and file a class-action lawsuit against Neiman Marcus in the wake of...

Hacker steals Bitdefender customer log-in credentials, attempts blackmail

The hacker exploited a vulnerability in an outdated software component to extract information from a single server

Researchers improve de-anonymization attacks for websites hiding on Tor

Attackers controlling entry nodes on the Tor network could find the location of hidden services or unmask users visiting them

OPM, Anthem hackers reportedly also breached United Airlines

Flight manifests including passenger information and destinations were stolen, report claims

Maliciously crafted MKV video files can be used to crash Android phones

Researchers discovered a vulnerability in Android's mediaserver component that can be exploited by malicious apps and websites

Logos

AnyConnect Day 0 Support for Windows 10 and OSX El Capitan

A summary of what versions are needed. What needs to be uninstall and re-installed. Best practices to get AnyConnect support on Day-1 of Windows 10, and what to do BEFORE you upgrade.

Russian hackers use Twitter to mask sneaky data theft

The Hammertoss malware reads encrypted data hidden in images to obtain new instructions

Cybersecurity Technology Integration Changes Everything

Based upon current and future cybersecurity technology integration trends, CISOs are adjusting budgets, organizations, skills, and vendor choices. Even industry analysts are impacted by cybersecurity technology integration.

Darkode cybercrime forum might be making a comeback

The forum's last administrator has plans to restore the site, with better protections against law enforcement investigations

Google: Lock up your Compute Engine data with your own encryption keys

The company didn't say whether it will offer this feature to its other Cloud Platform services

Most Android phones can be hacked with a simple MMS message or multimedia file

Vulnerabilities in the Android multimedia framework allow attackers to remotely compromise devices with ease, a researcher said

Researchers disclose four unpatched vulnerabilities in Internet Explorer

The reports contain limited information, making exploit development hard and unlikely

Measuring the Quality of Commercial Threat Intelligence

One person’s quality is another person’s fluff so objective measurements will be difficult. Threat intelligence quality may ultimately be gauged through crowdsourcing and threat intelligence sharing.

Former Hacking Team supplier stops selling zero-day exploits on ethical grounds

U.S.-based Netragard has terminated its zero-day exploit selling program in response to revelations about Hacking Team's customers

Report: Microsoft paying $320 million for cloud security provider Adallom

Adallom provides a range of security and data gathering tools to businesses

Cyberspies love exploits from Hacking Team leak

Advanced hacking group uses a second Flash exploit leaked from the surveillance software maker

Are There Differences Between Threat Intelligence Feeds?

Enterprise cybersecurity professionals find it difficult to judge the quality and efficacy of disparate open source and commercial threat intelligence. In the short term, this means more buying and selling.

Load More