Security

Security | News, how-tos, features, reviews, and videos

network security locks and cables
network / data center

network security primary2

How to protect your infrastructure from DNS cache poisoning

When your company’s internet access, VoIP and email all depend on DNS, you have to ensure your DNS server is protected against DNS spoofing attacks. One solution: DNSSEC.

L1TF

How the L1 Terminal Fault vulnerability affects Linux systems

The L1 Terminal Fault (L1TF) affects Intel processors and thereby Linux systems. Learn what this vulnerability is all about and what Linux users should do about it.

template c100.00 00 44 13.still001
video

Blue Team Village, DEF CON 2018 | Salted Hash Ep 43

Host Steve Ragan talks to Munin, a staffer at the DEF CON Blue Team Village about what's happening and what you can expect.

network switches ethernet cables

The rise of next-generation network packet brokers

Next-generation network packet brokers enable organizations to be agile and to align their IT strategies with business initiatives.

wannacry ransom screenshot

Chip maker TSMC will lose millions for not patching its computers

Chip-making giant TSMC will lose hundreds of millions of dollars for failing to patch its Windows 7 computers, which were infected by the WannaCry virus.

template c100.00 03 57 09.still001
video

An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41

In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.

template c100.00 06 55 04.still001
video

What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39

What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.

number 4 four film strip

4 ways to avoid cloud outages and improve system performance

Cloud providers can fall victim to outages just like anyone else. Here are some straightforward steps you can take to keep IT systems up, running and secure.

template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

security breach egg reveal locks binary code hacked

Cisco pays cool $2.3 billion for hot security company Duo

Cisco says integration of its network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will let customers quickly secure users to any application on any networked device.

salted hash thumbnail multi final
video

Conversation hijacking attacks | Salted Hash Ep 38

Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.

mobile security

Securing the modern mobile OS

Researchers from the Talos intelligence group recently published some research about a malicious MDM server pwning some mobile devices. In this blog post, we discuss how these mobile endpoints leverage MDMs and how the mobile OS is...

salted hash thumbnail multi final
video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

internet connect vlan router
Clear Choice Tests

REVIEW: Best VPN routers for small business

We evaluated five VPN routers suitable for small businesses from Cisco, D-Link, DrayTek, Mikrotik and ZyXEL based on price, features and user friendliness.

smart phone, smart watch, camera, stylus, lens

Q&A: Jeff Wilbur of the Online Trust Alliance on why enterprise IoT security is a lot like BYOD

Enterprise IT departments are seeing odd echoes of the problems they faced during the early BYOD era in the entrance of IoT technology into the enterprise, where one of the principal threats is the use of consumer-grade (read:...

salted hash thumbnail multi final
video

The risks associated with global Internationalized Domain Names | Salted Hash Ep 36

Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.

cwan 013 6securityreasons win10
video

6 security reasons to upgrade to Windows 10

From advanced authentication to new privacy controls, Windows 10 offers users solid security reasons to upgrade.

salted hash thumbnail multi final
video

Don't ignore application security | Salted Hash Ep 35

In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.

Load More