Network Security

Network Security news, information, and how-to advice

121615 chrome ex primary
networkhub

laptop in chains

Endpoint security trends for 2015: What can we expect?

In my data center work experience, a very significant percentage of the major network vulnerabilites I've had to fix were caused by the introduction of poorly secured computers. It's a surprisingly common blunder.

pyramid eye money

Report: NSA not only creates, but also hijacks, malware

Documents leaked by Edward Snowden show the NSA hijacks botnets and computers infected with malware by other intelligence agencies

Microsoft patch Tuesday focuses solely on Windows

For the first time in recent history, Microsoft has issued no security bug fixes for Internet Explorer

iot shodan

Shodan exposes IoT vulnerabilities

The Shodan search engine is the Google for the Internet of Things, a playground for hackers and terrorists -- and, maybe, a useful tool for companies looking to lock down their own environment

big data in the cloud

Akamai predicts more cheap hacking toolkits, political attacks next year

We'll be seeing more severe vulnerabilities like Shellshock and Heartbleed in 2015, cheap online hacking and politically motivated attacks predicts Akamai

aol sign

AOL halts malicious ads served by its advertising platform

The malicious ads had been served since late October, according to security company Cyphort

120214blog airplane laptop

Gogo Inflight Internet serves up 'man-in-the-middle' with fake SSL

A Google Chrome security engineer has discovered that Gogo In-flight Internet is issuing fake Google certificates.

010515 utm 1

CheckPoint, Watchguard earn top spots in UTM shootout

UTM appliances for SMB security are getting smaller, more powerful and more feature rich.

home router

Misfortune Cookie vulnerability affects 12 million routers

A newly-discovered vulnerability puts 12 million routers at risk around the world in homes, small business, and corporate environments.

Digital globes composed of ones and zeros

Virtual machines could be the gold standard for network security

Design a VM gold image right, build in all the security and monitoring that you need, keep it maintained, build out all the documentation your organization might need for security and compliance. When the business needs a new server...

queenspark

Ontario Government website hijacked

If you can remember when MC Hammer was big you recall the ear-worm of a song that was his big hit called “U Can’t Touch This”. In the music video he danced around in cartoonish looking pants and generally have a good time. Well,...

sony pictures studios

Breach insurance might not cover losses at Sony Pictures

Documents leaked by the group claiming responsibility for the attack on Sony Pictures show that the company has upwards of $60 million in cyber insurance coverage after consolidating coverage with Sony Corporation of America. But will...

credit card device

Retailers must not ignore security alerts, court says

In what some are calling a "game changer," a Minnesota federal court said Target could liable for data breach losses because the company had ignored its own security alerts

death of antivirus

Death of antivirus software greatly exaggerated

After years of predicted demise, AV software continues to protect.

bridge

How to bridge and secure air gap networks

The state of the art on Air Gap networks is changing with both better protective technologies and sneakier threats that take advantage of some very elegant and extreme hacks.

sony pictures studios

Mandiant to Sony Pictures: Nothing could have prepared you for this

In a letter to Sony Pictures' top executive on Saturday, Kevin Mandia, the CEO of Mandiant, said that the company's recent security problems were a well-planned crime that is unparalleled to anything his company has seen in recent...

patch ie

Microsoft slates 7 security updates for next week, resurrects Exchange fix

Microsoft plans to release seven security updates on Tuesday, three of them critical, to patch Internet Explorer, Windows, various pieces of the Office suite, and the SharePoint and Exchange server software.

bank vault door

Bank-backed security utility service to serve all industry sectors

Soltra Edge is a free, standards-based communications network that connects public and private cyberthreat intelligence providers with enterprise security technology platforms that can put this information to use

Load More