Network Security

Network Security news, trend analysis and opinion

Drive-by attack relies on hacked GoDaddy accounts

The Angler exploit kit is using subdomains created by cybercriminals on real domain name accounts as part of its infrastructure

FREAK is another serious flaw in the web's encryption

US export restrictions on encryption technology from the 1990s have come back to haunt the modern Web


Android users spammed with fake Amazon gift card offers

Text messages promising free gift cards deliver only spam instead

mobile fingerprint identification

Biometric security is on the rise

Does biometrics have a huge role to play in corporate security programs? We asked several experts to weigh in on the pros and cons of biometric security.

Is data on your new Lollipop Android device encrypted? Maybe not

Google has relaxed a requirement for manufacturers to turn on encryption by default in Lollipop

lock

SSL: Your network blind spot

You can't defend against what you can't see. How can the enterprise ensure security in the face of increasing SSL-encrypted data on their networks.

Challenges Associated with SSL/TLS traffic decryption and security inspection

Integration, organizational, performance, and technology problems abound

Finnish companies join forces to build secure OS for smartphones and tablets

A new version of Jolla's Sailfish OS is getting locked down with the help of SSH

Some Bitdefender products break HTTPS certificate revocation

This allows man-in-the-middle attackers with access to revoked, but otherwise valid, certificates to manipulate encrypted traffic

Containment security solutions for endpoints effectively stop attacks before harm is done

The way to protect PCs is to isolate untrusted tasks. BufferZone and Bromium offer interesting solutions

Lenovo website hacked in wake of Superfish debacle

Source code for the page names two alleged hackers

Europol and security vendors disrupt massive Ramnit botnet

The operation seized command-and-control servers and Internet domains used by the Ramnit gang

Facebook fixed 61 high-severity flaws last year through its bug bounty program

The company paid US$1.3 million to 321 outside security researchers in 2014

Flaw in popular Web analytics plug-in exposes WordPress sites to hacking

Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database

The challenges of enterprise network encryption and security

Enterprises are decrypting traffic for security inspection, but it ain't easy.

Critical remote code execution flaw patched in Samba

Users should install the Samba updates available for their systems as soon as possible

Many attackers lurk undetected for months, then pounce, study finds

Gaining access credentials is a way to keep access without installing malware, Mandiant said

Telegram dimisses claim of a flaw in its secure messaging application

Zimperium says Telegram doesn't protect content in memory, but Telegram says it's hard to defend against

hacked hacker breach security

You’ve been hacked. Now what?

6 key things to do after a security breach.

022315 detect malware 1

New tools can detect hidden malware

We tested new security appliances from Damballa, Lancope and LightCyber that are designed to detect the latest cyber-attacks.

Load More