Network Security

Network Security news, information, and how-to advice

security cruiser

hotel room

Flaw in common hotel router threatens guests’ devices

Corporate travelers should be warned that a vulnerable Wi-Fi router commonly used in hotels is easily compromised, putting guests passwords at risk and opening up their computers to malware infections and direct attacks.

router lights

At least 700,000 routers given to customers by ISPs are vulnerable to hacking

The devices have serious flaws that enable unauthorized remote access and DNS hijacking, a researcher found

devs freaking

Researchers find same RSA encryption key used 28,000 times

What if the key to your house was shared with 28,000 other homes? That's essentially what researchers with Royal Holloway of the University of London discovered last week while scanning the Internet to see how many servers and devices...

samsung galaxy tab s

BlackBerry teams with Samsung and IBM to offer governments a secure tablet

BlackBerry is returning to the tablet market -- this time with the help of Samsung Electronics, IBM and Secusmart, the German encryption specialist BlackBerry bought last year.

Computer cables connected to a router 84517144

Google services disrupted by routing error

Google's services were disrupted briefly on Thursday after a broadband provider in India made a network routing error. The provider, Hathway, made a technical change that caused traffic to more than 300 network prefixes belonging to...

Mobile marketing apps

2,400 unsafe apps on user phones in large firms

The average large global enterprise has about 2,400 unsafe apps on the mobile devices in its environment, according to a new study from mobile security vendor Veracode.

dropbox android

Dropbox patches Android SDK vulnerability

Dropbox has released an update to their Android Core and Sync/Datastore SDKs, after researchers at IBM discovered a vulnerability that would enable an attacker to connect applications to a Dropbox account under their control.

Detail view of organized medical files    87333166

Anthem accused of avoiding further embarrassment by refusing audit

Anthem Inc., the nation's second largest health insurer, has refused a request for an IT Security audit citing corporate policy. This is the second time the organization has refused an audit request from the Office of Personnel...

hunting orange

Adobe invites help hunting vulnerabilities in its online services

The company offers no bounties, just public kudos

firehose

Information overload, SIEM version

Our manager is very happy with the performance of his security information and event management platform, but sometimes it’s too much for the network bandwidth. Fortunately, an easy fix is at hand.

D-Link Connected Home

D-Link patches router, says more fixes are on the way

D-Link issued fixes on Monday for flaws that could allow remote access to one of its routers, and will patch several other models in the coming week.

android

Is data on your new Lollipop Android device encrypted? Maybe not

Some smartphone manufacturers are not configuring devices running the latest version of Android to automatically encrypt personal data, which Google had said would scramble data by default.

android for work mobileiron

Google steps up its BYOD game; looks to secure more than a billion mobile devices

On Wednesday, Google officially launched Android for Work, which was announced last June at its I/O conference. The aim is to offer businesses a stopgap that addresses BYOD needs, including secured access to sensitive data and OS...

security log monitoring

How better log monitoring can prevent data breaches

Recent high-profile data breaches reaffirm that the threat from data thieves is both persistent and pervasive. Could better log monitoring mitigate or even prevent these types of security catastrophes?

Lenovo Y50 gaming laptop

Lenovo says Superfish problems are theoretical, but that simply isn't the case

On Thursday, the world woke to the news that commercial-grade Lenovo PCs were being shipped from the factory with adware pre-installed on the system. Designed to provide a visual shopping experience, the software is insecure and...

blackshades

Swedish man pleads guilty to peddling Blackshades malware

A Swedish man pleaded guilty Wednesday to peddling one of the most prevalent spying programs called Blackshades that was widely used by the criminal underground.

home router

Tens of thousands of home routers at risk with duplicate SSH keys

A setup mistake has apparently left hundreds of thousands of home routers running the SSH (Secure Shell) remote access tool with identical private and public keys.

typing writing technology cmputer keyboard stealth spying 000003139028

Equation cyberspies use unrivaled, NSA-style techniques to hit Iran, Russia

A cyber espionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.

Load More