Network Security

Network Security news, information, and how-to advice

5 details you may miss in apples new macs
global circulation 111831280

ashley madison

Ashley Madison hackers publish compromised records

The group responsible for the Ashley Madison hack published the compromised records on Tuesday, delivering on the promise made when the hack was announced in July. The compromised records include account profile information, personal...

portmap

Gaming services, hosting companies hit with new type of DDoS attack

Gaming and hosting companies have been hit with a new kind of DDoS attack that could snowball without preventive steps, Level 3 Communications warned on Monday.

windows 10 desktop

Key things to consider before you switch to Windows 10

Microsoft has started pushing Windows 10 updates, as the newest operating system officially launched last month. However, the latest and greatest might not be the best fit for some organizations, and there are some things that need to...

0 title

7 sexy legacy deception techniques that still work today

As in war, so in cyber defense and attack: legacy deception techniques still in use.

anti virus software 1

Kaspersky denies faking anti-virus info to thwart rivals

A Reuters article quoted anonymous sources saying Kaspersky tagged benign files as dangerous, possibly harming users

glowing router

Your router: Gateway for hackers

The router has been called the 'backbone of the Internet.' If that is the case, it is a broken backbone, according to security experts, who say they are dangerously vulnerable, and there is currently no way to upgrade or patch most of...

android umbrella

Google has another try at patching Stagefright flaw

Google has sent the patch to its partners and will fix its Nexus line of devices

cisco install

Cisco warns customers about attacks installing rogue firmware on networking gear

Compromised administrative credentials were used to flash malicious boot firmware on Cisco IOS devices

boarded windows

Patch Tuesday survives for Windows 10

Contrary to expectations earlier this year, Patch Tuesday survived the rollout of Windows 10.

networked globe connections links light world

New IP address blacklist based on Web chatter

Traditionally, blacklists of malicious IP addresses are assembled using honeypots and intrusion detection systems but a new approach, analyzing chatter on the dark and open Web, can find malicious addresses that would have been...

blue robots

Asprox botnet, a long-running nuisance, disappears

Asprox's operators may be regrouping to evade detection, according to Palo Alto Networks

Fred's Pharmacy

Retailer Fred's found payment card malware on two servers

It doesn't appear card details were removed from its systems, Fred's said

Modem

Internal LTE/3G modems can be hacked to help malware survive OS reinstalls

Researchers found a way to write malicious firmware to a popular LTE/3G modem module built into business laptops and tablets

light from window

Researchers find way to steal Windows Active Directory credentials from the Internet

The technique could enable attackers to attack Windows servers hosted in the cloud

Intel Core

Design flaw in Intel processors opens door to rootkits, researcher says

The vulnerability was introduced in 1997, but has remained hidden until now

leaky laptop2

New malware turns your computer into a cellular antenna

Critical data can be collected from a computer using a feature phone

telesign - turn it on - turnon2fa

Consumers still don’t get two-factor authentication

Telesign’s online guide to securing your accounts with two-factor authentication continues to educate consumers about online security.

hacked hacker breach security

Attackers could use Internet route hijacking to get fraudulent HTTPS certificates

There's no easy fix, a security researcher said at the Black Hat security conference

Load More