Network Security

Network Security news, information, and how-to advice

D-Link Connected Home
android

android for work mobileiron

Google steps up its BYOD game; looks to secure more than a billion mobile devices

On Wednesday, Google officially launched Android for Work, which was announced last June at its I/O conference. The aim is to offer businesses a stopgap that addresses BYOD needs, including secured access to sensitive data and OS...

security log monitoring

How better log monitoring can prevent data breaches

Recent high-profile data breaches reaffirm that the threat from data thieves is both persistent and pervasive. Could better log monitoring mitigate or even prevent these types of security catastrophes?

Lenovo Y50 gaming laptop

Lenovo says Superfish problems are theoretical, but that simply isn't the case

On Thursday, the world woke to the news that commercial-grade Lenovo PCs were being shipped from the factory with adware pre-installed on the system. Designed to provide a visual shopping experience, the software is insecure and...

blackshades

Swedish man pleads guilty to peddling Blackshades malware

A Swedish man pleaded guilty Wednesday to peddling one of the most prevalent spying programs called Blackshades that was widely used by the criminal underground.

home router

Tens of thousands of home routers at risk with duplicate SSH keys

A setup mistake has apparently left hundreds of thousands of home routers running the SSH (Secure Shell) remote access tool with identical private and public keys.

typing writing technology cmputer keyboard stealth spying 000003139028

Equation cyberspies use unrivaled, NSA-style techniques to hit Iran, Russia

A cyber espionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.

Wifi sign on gate

Personal weather stations can expose your Wi-Fi network

In the latest Internet of Things security blunder, personal weather station devices made by Netatmo were found sending users' Wi-Fi passwords back to the company over unencrypted connections.

first-aid medicine cure patch remedy

Report: Microsoft packing more patches into fewer bulletins

Microsoft is packing more common vulnerability exposures into its critical bulletins, according to a new report.

industrial iot

ARM acqusition highlights quest to embed IoT security

Chip makers such as ARM and Intel are working to improve security in software and hardware

password manager

How to keep track of all your passwords

We run through the password managers on the market for you.

data protection

How to create an effective data security communication plan

There is a need to create value around company data and one way to do this is to ensure that the workforce knows and understands the threats that are out there and the measures that are in place to protect against them.

cso50 winners

CSO50 winners announced

Find out the winners of CSO's upcoming event.

121615 chrome ex primary

New Chrome extension spots unencrypted tracking

TrackerSSL is aimed at alerting websites of insecure tracking via Twitter

networkhub

DDOS attack size up 50-fold over past decade

The size of the largest DDOS attack was fifty times larger last year than ten years ago, according to a new survey of Internet service and hosting providers, and attacks are also increasing in numbers and in sophistication

laptop in chains

Endpoint security trends for 2015: What can we expect?

In my data center work experience, a very significant percentage of the major network vulnerabilites I've had to fix were caused by the introduction of poorly secured computers. It's a surprisingly common blunder.

pyramid eye money

Report: NSA not only creates, but also hijacks, malware

Documents leaked by Edward Snowden show the NSA hijacks botnets and computers infected with malware by other intelligence agencies

Microsoft patch Tuesday focuses solely on Windows

For the first time in recent history, Microsoft has issued no security bug fixes for Internet Explorer

iot shodan

Shodan exposes IoT vulnerabilities

The Shodan search engine is the Google for the Internet of Things, a playground for hackers and terrorists -- and, maybe, a useful tool for companies looking to lock down their own environment

Load More