Network Security

Network Security news, trend analysis and opinion

Mobile security: A mother lode of new tools

You may know your smartphone, but pretty soon the question will be: How well does your smartphone know you?

Canada blames China for cyber intrusion at National Research Council

The attack was carried out by highly sophisticated state-sponsored hackers, the government of Canada said


Android vulnerability allows malware to compromise most devices and apps

Attackers can impersonate trusted developers to gain powerful privileges on the OS, researchers from Bluebox Security said

Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness

Attackers are targeting Amazon EC2 instances with Elasticsearch 1.1.x installed

Portnox NAC offers complete control, including over BYOD and cloud

Cloud computing, mobile computing and especially BYOD are bringing a new urgency to Network Access Control (NAC). Portnox offers a solution that reduces cost and complexity so organizations can deploy NAC in every branch location for...

Russian government offers money for identifying Tor users

The Russian Ministry of Interior announced a contract for research on obtaining information about Tor users and their systems

Thousands of sites compromised through WordPress plug-in vulnerability

Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress

BlackBerry offers BES10 as a hosted service through partners

Businesses wanting the security of BlackBerry Enterprise Service 10 without the complexity of managing it onsite can now buy it as a hosted service from six BlackBerry partners.

File-encrypting Android ransomware 'Simplocker' targets English-speaking users

The malware was updated to use FBI-themed alerts and encrypt backup files, researchers from ESET said

Arrests made after international cyber-ring targets StubHub

StubHub accounts were compromised and used to buy tickets for popular events, which were then resold

BYOD morphs from lockdown to true mobility

Four companies that have been at BYOD for a while talk about how their programs have changed with the times.

Tor Project working to fix weakness that can unmask users

The anonymity software's developers believe they've identified the problem

Virtru launches business email encryption service for Google Apps

The service, which allows for fine administrator control of messaging, is free to try through later this year

ransom ware

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

The Cryptolocker takedown led to a better designed, more resilient ransomware threat

Open Wireless Router firmware aims for better router security, network performance

The new custom router firmware will allow users to share their wireless networks, but could also improve their router's security

EFF releases Chrome, Firefox plugin to block third-party tracking

One feature aims to stop tracking tied to clicking the Facebook 'like' on outside sites

Home router security to be tested in upcoming hacking contest

Researchers will compete to exploit previously unknown vulnerabilities in popular home routers

Romanian gang used malware to defraud international money transfer firms

The cybercriminals targeted money transfer franchises in several European countries

Aloha point-of-sale terminal, sold on eBay, yields security surprises

An HP researcher's findings highlight ongoing problems with POS software and hardware

Net neutrality a key battleground in growing fight over encryption, activists say

Both carriers and government now have an interest in how users keep their online lives private

Load More