Network Security

Network Security news, information, and how-to advice

signs arrow confused

fireeye logo

Security companies shouldn’t be this thin-skinned

FireEye, like all companies, wants to protect its intellectual property. But it needs to realize that security companies aren’t perceived like other companies.

cctv outdoors

IP camera makers pressure researcher to cancel security talk

An upcoming talk covering security problems in Internet-connected cameras has been canceled after opposition from some manufacturers.

dark corners of network

A viral vigilante may be keeping an eye on your home router

Researchers at Symantec have shed new light on an old virus affecting routers and other devices running Linux: it appears to be protecting them from other malware infections

Tmobile SIM card

T-Mobile US says Experian breach exposed 15M customers

On Thursday, T-Mobile US T-Mobile CEO, John Legere, said that the names, addresses, Social Security numbers, birthdays, and ID information on more than 15 million customers has been compromised after a breach at Experian.

fixing roof

Cisco fixes privilege escalation flaws in AnyConnect Secure Mobility Client

The Cisco AnyConnect Secure Mobility Client was updated to fix vulnerabilities that could allow attackers to gain system or root privileges on Windows, Linux and Mac OS X computers.

Target store exterior

Report: Target failed to execute security basics

Target hired Verizon to figure out what was behind its 2013 data breach and Verizon found that the company’s security problems can be summed up as failure to do the basics.


Profiling an insider

When the security threat comes from within your own company, it is often hard to see the signs beforehand.

hindenburg disaster 1937

DDoS attacks: a perfect smoke screen for APTs and silent data breaches

Growing DDoS attacks more and more frequently try to distract incident response teams in order to hide much bigger security incidents.

Security in cloud computing

After pushing malware, ad networks also used for DDoS

Experts believe a recent large-scale distributed denial-of-service attack was launched through malicious ads displayed on mobile devices.

shadow man

Time to get out in front of shadow IT

Business colleagues with a technical itch can be effective allies if you foster a sane, productive strategy around DIY IT

00 ftc settlement

12 companies that the FTC has gone after for lax security

On the attackImage by ThinkstockThe FTC has brought legal actions against organizations that have violated consumers’ privacy rights, or misled them by failing to maintain security for sensitive consumer information. The courts have...

cybersecurity ts

Tighten up your cyber security strategies now

While there are many security offerings to help an organization better protect itself from the onslaught of cyber threats knocking on its perimeter, no one solution is enough to reduce risk in this dynamic landscape. Each individual...


Inherited risk: The downside of mergers and acquisitions

Enterprises going through mergers and acquisitions reap the benefits of new products and other assets, but they also acquire all of the threat vectors that have been targeting the other organization.  

Computer cables connected to a router 84517144

Cisco routers targeted in recent attacks, FireEye says

In a blog post on Tuesday, FireEye reported the discovery of compromised Cisco devices in Ukraine, Philippines, Mexico, and India.

cyber attack stock image

Attackers go on malware-free diet

To avoid detection, some hackers are ditching malware and living "off the land" -- using whatever tools are already available in the compromised systems.

mit stata center

MIT scores worst in cybersecurity

In a new cyber security survey of 485 large colleges and universities, the Massachusetts Institute of Technology came in at the bottom of the list

3D collage of financial money charts and icons

How to be a successful CISO without a 'real' cybersecurity budget

Many CISOs are becoming the first CISO for their company, but no formal budget exists.

big data fabric

Intel: Criminals getting better at data exfiltration

Enterprises tend to be highly focused on keeping attackers out of their systems, but most of the actual damage happens not when the bad guys first break in, but when they're able to successfully steal data -- and the techniques...

Load More