Security

Security | News, how-tos, features, reviews, and videos

Internet of things face

Remote code execution is possible by exploiting flaws in Vxworks

Critical vulnerabilities have been found in WindRiver’s VxWorks’ real-time operating system that powers an advertised 2B connected devices, including some networking gear.

CSO > Security mechanisms vs. fiery threats

The role of next-gen firewalls in an evolving security architecture

As the commercial enterprise firewall approaches its 30th birthday, it is hard to overstate how dramatically the product has evolved. This 2,700-word research report looks the current state of next-generation firewall technology.

CSO  >  Botnet  >  Robots amid a blue binary matrix

Reports: As the IoT grows, so do its threats to DNS

ICANN and IBM's security researchers separately spell out how the growth of the internet of things will increase opportunities for malicious actors to attack the Domain Name System with hyperscale botnets and worm their malware into...

hack your own wi fi neon wi fi keyboard hacker

When it comes to the IoT, Wi-Fi has the best security

It’s easy to dismiss good ol’ Wi-Fi’s role in internet of things networking. But Wi-Fi has more security advantages than other IoT networking choices.

A hooded man in a halloween mask raises a finger to his lips to encourage silence.

Worst DNS attacks and how to mitigate them

DNS threats, including DNS hijacking, tunneling, phishing, cache poisoning and DDoS attacks, are all on the rise.

cssg 017 thumb
video

How to set up Microsoft Cloud App Security

This new add-on will let you set up alerts about suspicious sign-on activity for Office 365 and other cloud apps.

network security hacker virus crime

Tempered Networks simplifies secure network connectivity and microsegmentation

Tempered Networks’ IDN platform uses the Host Identity Protocol to partition and isolate the network into trusted microsegments, providing an easy and cost-effective way to secure the network.

CSO  >  Binary warnings / alerts / exclamation marks among binary code.

Cisco sounds warning on 3 critical security patches for DNA Center

Cisco issued three “critical” security warnings for its DNA Center users – two having a Common Vulnerability Scoring System rating of 9.8 out of 10.

tt19 030 thumb
video

How updates to MongoDB work to prevent data breaches | TECH(talk)

CSO senior writer Lucian Constantin and Computerworld Executive Editor Ken Mingis talk database security and how MongoDB's new field-level encryption takes security to the next level.

RIP - grave - tombstone - cemetery - death [Image by Rob van der Meijden - CC0 via Pixabay]

Oracle does-in Dyn, resets DNS services to cloud

Oracle wants its DNS customers to migrate from its Dyn service to Oracle Cloud services, but some of those customers are very unhappy.

dll injection

Tracking down library injections on Linux

Library injections are less common on Linux than they are on Windows, but they're still a problem. Here's a look at how they work and how to identify them.

iot internet of things chains security by mf3d getty

7 steps to enhance IoT security

Securing the IoT is a multi-faceted effort that requires big moves as well as small adjustments to ensure networks, systems, data and devices are protected. Here are 7 security practices you might not have considered.

tf19 036 thumb2
video

How the Huawei ban could become a security threat | TECH(feed)

We’ve already talked about how the Huawei ban may affect business, but how will it affect security? Google has already warned of security threats should the company be unable to send updates to Huawei’s Android-powered devices. And...

Report: Mirai tries to wrap its tentacles around SD-WAN

Palo Alto Networks’ security team says an update of the infamous IoT-focused Mirai software targets enterprise-grade SD-WAN appliances

ringvideodoorbellpro

IoT security vs. privacy: Which is a bigger issue?

When it comes to the internet of things (IoT), security has long been a key concern. But privacy issues could be an even bigger threat.

IoT / Internet of Things / wireless network devices / mapping connections

Free course - Ethical Hacking: Hacking the Internet of Things

Offer extended through Aug. 31: Enterprises are deploying internet-of-things devices in their networks to reap manifold benefits, but they need expertise to properly secure them. Network World and Pluralsight have teamed up to offer...

nwan 019 iiot

Cisco to buy IoT security, management firm Sentryo

Buying Sentryo will give Cisco support for anomaly and real-time threat detection for the industrial internet of things.

tt19 024 thumb
video

What do recent public SAP exploits mean for enterprises? | TECH(talk)

Recently released public SAP exploits (dubbed 10KBLAZE) could pose a security risk for thousands of businesses. Computerworld executive editor Ken Mingis and CSO Online's Lucian Constantin discuss the fallout of 10KBLAZE, and how...

CSO > phishing / social engineering / security threat

Cisco security spotlights Microsoft Office 365 e-mail phishing increase

The leading e-mail service— in Microsoft’s Office 365 package – seems to be getting the most attention from those attackers hellbent on stealing enterprise data or your private information via phishing attacks.

sd-wan options

Survey finds SD-WANs are hot, but satisfaction with telcos is not

A recent survey of over 400 IT executives by Cato Networks found that legacy telcos might be on the outside looking in for SD-WANs.

Load More