Network Security

Network Security news, trend analysis and opinion

Phishing key

The UPS Store says malware found on systems of 51 stores

Names, postal and email addresses and payment card data may have been exposed


'Reveton' ransomware upgraded with powerful password stealer

Avast thinks its controllers are trying to diversify after profits have fallen

shutterstock 203588131

Yes, medical device security is lousy - so what?

There is no debate that the cyber security built into medical devices is practically nonexistent. But there is debate over how much that puts patients at risk. On one side are experts who say the benefits far outweigh the minuscule...

Google broadens its malware sleuthing to sniff out deceptive downloads

More types of malicious software will be identified by Google's safe browsing service

New Gameover Zeus botnet keeps growing, especially in the US

A new Gameover Zeus malware variant has infected over 10,000 systems so far, researchers say

The biggest iPhone security risk could be connecting one to a computer

Design quirks allow malware to be installed on iOS devices and cookies to be plucked from Facebook and Gmail apps

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

The flaws could allow attackers to access data stored on BlackBerry phones or sensitive credentials logged on servers

Users should patch critical flaw in Adobe Reader and Acrobat, researchers say

Adobe also releases critical updates for Flash Player and AIR

Malware is less concerned about virtual machines

Symantec finds most malware doesn't quit if it runs on VM, which used to be a sign it was being analyzed

Fifteen new vulnerabilities reported during router hacking contest

Five popular router models were hacked during the SOHOpelessly Broken competition at DefCon 22

Many home routers supplied by ISPs can be compromised en masse, researchers say

Some ISP servers used to manage routers provisioned to customers can be hacked from the Internet, researchers from Check Point said

Some mobile POS devices still affected by critical flaws months after patch

Security researchers demonstrated that they can completely compromise such devices by using programmable smart cards

Oracle issues a virtual strongbox for enterprise encryption keys

Oracle Key Vault provides a central repository for storing enterprise encryption keys

MAB Example

MAB with Non-Cisco Switches

Blog describing MAC Authentication Bypass (MAB), and how to integrate Non-Cisco Switches with Cisco Identity Services Engine (ISE) for MAB.

blackhat2013

Black Hat 2014: The challenge of securing embedded devices and IoT on display

Industry doesn’t yet fully realize extent of subversion possible through IoT security, researchers say.

Carriers' remote control software continues to put some mobile devices at risk

Security researchers have identified serious vulnerabilities in carrier-mandated remote management software installed on mobile devices

Google lowers search ranking of websites that don't use encryption

The move is intended to promote better security practices across the Web

Network-attached storage devices more vulnerable than routers, researcher finds

A security review found serious vulnerabilities in 10 popular NAS systems

‘Unusual uptick’ in attacks on media, publishing, Cisco says

‘Dynamic DNS’ also becoming exploited by cyber-criminals for botnet operations.

Load More