Security

Security | News, how-tos, features, reviews, and videos

shuffling cards

How ASLR protects Linux systems from buffer overflow attacks

ASLR is a memory exploitation mitigation technique used on both Linux and Windows systems. Learn how to tell if it's running, enable/disable it, and get a view of how it works.

spring cleaning vacuum carpet

ICANN housecleaning revokes old DNS security key

ICANN will complete the switchover this week to a new internet security key that protects DNS, the internet's address book. The old Root Key Signing Key will be decomissioned Jan. 10.

verizon samsung 5g

Six IoT predictions for 2019

From security issues to skills shortages, these are the most important Internet of Things things to look for in 2019.

band aid patch fix bandage tin container mend by franckv unsplash

Cisco patches a critical patch on its software-license manager

CIsco has issued a critical patch of a patch for a Cisco Prime License Manager SQL fix.

workplace distractions donuts crazy

10 of the coolest and wackiest tech stories of 2018

From quantum computing to smart drones, network security goofs and AI developments it has been an interesting year.

smart city iot digital transformation networking wireless city scape skyline

What will be hot for Cisco in 2019?

Software, SD-WAN, security, high-speed data-center networking, and more software fill up the Cisco hot plate for 2019.

spinning globe smart city iot skyscrapers city scape internet digital transformation

DNS over HTTPS seeks to make internet use more private

The IETF has standardized DNS over HTTPS (DOH), which encrypts DNS queries so eavesdroppers can’t tell what sites users connect to.

IoT / Internet of Things / wireless network devices / mapping connections

Securing the IoT has become business-critical

Investments in IoT security can have significant positive business implications, a 
recent survey from DigiCert finds.

Network World: IoT Hacks [slide-05] > Car Talk > Automotive hacks

The perils of using voice commands with IoT machines

Combine the IoT, voice commands and machines, and you’re creating a potentially disastrous recipe of unintended consequences.

rawpixel com 296621 unsplash

Download Malwarebytes Today and Protect Your Data for Free

This innovative cybersecurity software helps you fight hackers, and it’s free.

nvidia t4 gpu

GPUs are vulnerable to side-channel attacks

Researchers at UCLA Riverside discover GPUs can be victims of the same kinds of attacks as Meltdown and Spectre, which have impacted Intel and AMD CPUs.

screen shot 2018 09 21 at 10.43.22 am

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

Tablet with lock showing secure encryption

What is Transport Layer Security (TLS)?

Transport Layer Security (TLS), a cryptographic protocol that provides end-to-end communications security over networks, including the internet, has been improved in TLS 1.3.

free wifi secure network public wifi chain links

What is WPA3? And some gotchas to watch out for in this Wi-Fi security upgrade

The Wi-Fi Alliance has introduced the first major security improvement to Wi-Fi in about 14 years: WPA3. The most significant additions to the new Wi-Fi security protocol are greater protection for simple passwords, individualized...

farmer tractor

Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT

Forget smartphones — the U.S. Copyright Office’s new DRM exemptions could be a big deal for farmers and other heavy equipment operators and vendors.

firewall network security lock padlock cyber security

The best enterprise level firewalls: Rating 10 top products

How do you choose the best firewall? This 37-page downloadable report features reviews from hundreds of network security pros who have used the products in real-world situations.

ipsecurity protocols network security vpn3

ICANN’s internet DNS security upgrade apparently goes off without a glitch

The KSK rollover involved generating a new cryptographic public and private key pair and distributing the new public component to parties who operate validating resolvers, according to ICANN. Such resolvers run software that converts...

padlock on ethernet cables for secure network

Identity awareness: it’s more than just a packet

Routing must reflect business context.

brain team iot analytics

Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Cisco closes on its $2.35 billion deal with network identity, authentication security firm Duo. The deal will help customers securely connect any user to any application on any network.

patching against ransomware

Cisco unearths 13 'High Impact' IOS vulnerabilities you need to patch now

Cisco has exposed 13 vulnerabilities in its IOS and IOS XE switch and router operating software that the company said should be patched as soon as possible. The vulnerabilities were detailed in Cisco’s twice-yearly dump of IOS...

Load More