Network Security

Network Security news, trend analysis and opinion

The Highs and Lows of Cybersecurity Integration

Enterprises are building their own integrated cybersecurity architecture so technology vendors must acquiesce or be publicly shunned.

Like routers, most USB modems also vulnerable to drive-by hacking

Attackers can hijack DNS settings by exploiting vulnerabilities in the Web-based management interfaces of 3G/4G USB modems


Navigating a field of uncertainty and doubt questions

Can you answer these 4 questions about your network security policies?

Network security doesn't have to be expensive, and it doesn't have to be complicated. Fancy new technologies won’t help if you're not focusing on the roots of good cybersecurity. Let's talk about some of the most important questions...

Mr. CISO: Tear Down These Legacy Cybersecurity Walls!

Organizational processes and intransigence are antithetical to strong cybersecurity

Synology patches serious flaws in its network-attached storage devices

One vulnerability could let attackers compromise NAS boxes and data stored on them

Attackers use email spam to infect point-of-sale terminals with new malware

They're likely counting on some employees misusing such terminals to browse the Web or check their personal email at work

Large scale attack hijacks routers through users' browsers

Researchers found a Web attack tool designed specifically to exploit vulnerabilities in routers and hijack their DNS settings

Factory reset in Android phones leaves sensitive user data behind

Researchers recovered access credentials, emails, text messages and other sensitive information from wiped Android phones

Netgear and ZyXEL confirm NetUSB flaw, are working on fixes

The vulnerability could allow attackers to take over affected routers

E-paper display gives payment cards a changing security code

The technology, from Oberthur Technologies, will be tested by two banks in France

Android stock browser vulnerable to URL spoofing

It's recommended that users install Chrome or another browser

First software update for Apple Watch includes security fixes

The update patches 13 vulnerabilities and updates the trusted root SSL certificates

New encryption flaw, LogJam, puts Web surfers at risk

The flaw is closely related to FREAK and involves downgrading TLS connections to a weak key

Critical vulnerability in NetUSB driver exposes millions of routers to hacking

Tens of routers and other embedded devices from various manufacturers likely have the flaw, security researchers said

Toward Omniscient Cybersecurity Systems

CISOs need an all-knowing central system to truly address their cybersecurity monitoring, diagnostics, and operations needs

URL-spoofing bug in Safari could enable phishing attacks

A researcher developed code that can trick Safari into showing a different URL in its address bar than the one currently loaded

Apple, Google urge Obama to reject encryption back doors

The firms signed a group letter calling on the president to resist security workarounds demanded by law enforcement

In desperation, many ransomware victims plead with attackers

TeslaCrypt creators negotiated with victims, earned over $76,000 in two months

security tools 1

Top security tools in the fight against cybercrime

There’s no silver bullet, so load up with as many of these as you can.

security tools 1

13 must-have security tools

The experts weigh in on their top picks for protecting enterprise networks.

Load More