Network Security

Network Security news, trend analysis and opinion

NIST pledges transparency in NSA dealings over crypto standards

The agency says it will disclose all contributions from the National Security Agency

Thousands of U.S. gas stations exposed to Internet attacks

Over 5,000 tank gauges that are used to monitor fuel levels and potential spills are accessible from the Internet without a password


Adobe fixes just one of two actively exploited zero-day vulnerabilities in Flash Player

Internet Explorer and Firefox users with Flash Player enabled remain at risk

Kim Dotcom ready to take on Skype with end-to-end encrypted video calling service

MegaChat opens up for public testing

Attackers are exploiting a zero-day vulnerability in Flash Player

The exploit was included in the Angler exploit kit, a security researcher reported

Critical Java updates fix 19 vulnerabilities, disable SSL 3.0

Future Java 7 security patches will not be publicly available so users should migrate to Java 8

Netgear Arlo Home Security Camera

Reviews: Netgear's Arlo simplifies home video security; Logitech widens its wireless mice

Home video monitoring becomes truly plug-and-play

Report: NSA not only creates, but also hijacks, malware

Documents leaked by Edward Snowden show the NSA hijacks botnets and computers infected with malware by other intelligence agencies

Cleared your browser cookies? It won't stop ad company using Verizon tracking header

An advertising company uses the unique identifier headers added by Verizon to Web traffic to recreate tracking cookies deleted by users

CryptoWall ransomware is back with new version after two months of silence

CryptoWall 3.0 uses both the Tor and I2P anonymity networks for increased stealthiness

Adobe patches remote code execution and keylogging flaws in Flash Player

Some of the vulnerabilities allow attackers to take full control of users' systems

011515blog sausage throwing woman

Watch a woman I’m not related to toss sausages at police here in Framingham

Yes, this happened right here in the town in which I work, and, yes, the sausage-tossing alleged perpetrator and I share the same surname, but, no, we are not related, at least to the best of my knowledge.

Vulnerabilities in several Corel programs allow attackers to execute malicious code

Malicious DLLs will be executed if stored in the same directory as media files opened with the affected programs, researchers said

UK prime minister suggests banning encrypted apps like WhatsApp, iMessage

Having access to people's communications is vital for combating terrorism, David Cameron says

Obama calls for data breach notification law, privacy bill of rights

The White House will push Congress to pass new laws addressing data privacy and ID theft, the president says

shooting fish in a barrel

Why criminals pick on small business

Small to midsized enterprises may not have a lot to offer cyber criminals individually. But collectively, they're a very big, very lucrative target, for one major reason: Their security tends to be lousy.

OpenSSL patches eight new vulnerabilities

The flaws are of moderate and low severity, but server admins should still update

network security diagram 42 25789247

Lessons from the Sony breach in risk management and business resiliency

The recent Sony attack and countless other examples point to the need for board members and executives to consider cybersecurity under the concept of risk management and business resilience.

Exploit allows Asus routers to be hacked from local network

Users should install firmware updates as soon as they become available and should block untrusted devices on their networks

Vectra Networks correlates odd bits of user behavior that signal an attack in progress

Perimeter security is insufficient, especially against insider attacks. Companies need additional capabilities that can identify attacks in progress. Vectra Networks utilizes user behavioral analysis to identify and correlate...

Load More