Network Security

Network Security news, information, and how-to advice

11 signs you've been hacked -- and how to fight back

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned

Thousands of sites compromised through WordPress plug-in vulnerability

Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress


Arrests made after international cyber-ring targets StubHub

StubHub accounts were compromised and used to buy tickets for popular events, which were then resold

File-encrypting Android ransomware 'Simplocker' targets English-speaking users

The malware was updated to use FBI-themed alerts and encrypt backup files, researchers from ESET said

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

When is your infrastructure safe from Heartbleed?

Now that IT departments have fixed the Heartbleed bug in most internet-facing software, security pros have started debating the risk of not patching software buried deep in the data center.

Tor Project working to fix weakness that can unmask users

The anonymity software's developers believe they've identified the problem

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

The Cryptolocker takedown led to a better designed, more resilient ransomware threat

Net neutrality a key battleground in growing fight over encryption, activists say

Both carriers and government now have an interest in how users keep their online lives private

Big Data, Big Mess: Sound Risk Intelligence Through Complete Context

This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.

binary hard drive

CryptoWall blamed for possible data breach at Benjamin F. Edwards & Co.

Warning of a potential data breach, Benjamin F. Edwards & Co. (BFE) says that CryptoWall, a variant of CryptoLocker, infected an employee's computer on May 27.

Aloha point-of-sale terminal, sold on eBay, yields security surprises

An HP researcher's findings highlight ongoing problems with POS software and hardware

Romanian gang used malware to defraud international money transfer firms

The cybercriminals targeted money transfer franchises in several European countries

There's almost a million fake apps targeting your phone

Trend MIcro finds hundreds of thousands of fake Android apps in trawl of online stores, forums

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk

This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this information to determine which cyber insurance options make the most sense based on your

pcw

Juniper Networks improves defense against DDoS attacks

Juniper Networks announced new enhancements to its DDoS Secure solution to offer better protection against DDoS attacks.

Google sets up cybercrime-busting task force

After unearthing the Heartbleed flaw, Google sets up a research group dedicated to finding vulnerabilities in Web software

big data 19

Securing big data off to slow start

While big data implementations have taken off, the work needed to secure these systems has not.

firewall

The Firewall: Questions abound about its future role in cloud, mobile and SDN environments

It’s been 20 years since Check Point FireWall-1 made firewalls mainstream.

5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain

This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.

Future Java 7 security patches will work on Windows XP despite end of official support

Windows XP users will continues to receive Java 7 security updates until at least April 2015, Oracle says

New banking malware 'Kronos' advertised on underground forums

Its creators seek to establish the new threat as a premium commercial alternative to older Trojans like Zeus

Source code for tiny 'Tinba' banking malware leaked

The code has appeared in an underground forum, according to Denmark-based security company CSIS

The Gameover Trojan program is back, with some modifications

Cybercriminals are trying to ressurect the recently disrupted Gameover Zeus botnet, researchers say

Load More