Internet Security

Internet Security | News, how-tos, features, reviews, and videos

data keys encryption password by gerd altmann cc0 via pixabay
padlock / Domain Name System / DNS / ICANN / security

IPv6 wireless network protocol

7 points your security team needs to know about IPv6 (but probably doesn't)

The IPv6 protocol affects the security of your network even if you haven't deployed it internally. Here are the most important points every security team needs to understand about the protocol.

A hacker targets a sitting duck  >  easy target / easy pickings / victim targeting

Enterprise internet attack surface is growing, report shows

Attackers are taking advantage of the COVID-19 crisis to exploit pre-existing and newly introduced vulnerabilities across a wide range of attack points.

scanning the internet malicious magnifying glass

Should you deploy a TLS 1.3 middlebox?

Organizations moving to the TLS 1.3 protocol must decide whether to deploy middleboxes that intercept network traffic for greater visibility, but doing so presents security and regulatory risks.

keep out sign do not tresspass privacy authentication access barbed wire by tim husser getty

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure...

servers / server racks [close-up perspective shot]

9 tips to detect and prevent web shell attacks on Windows networks

Attackers often use web shells to mimic legitimate files and compromise web servers. These best practices will lower your risk.

Abstract trend lines graphing change and transformation.

Top cybersecurity facts, figures and statistics for 2020

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry.

Internet of Things (IoT) / security alert / wireless network management

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk.

credit card hack financial breach stealing money traffiking financial data target by igphotography

Macy’s breach is a game-changing Magecart attack

The attackers customized the Magecart code to the Macy's website to steal credit card information in the wallet and new registrations.

Bingo balls read 19, 20 and 21; no. 20 at the forefront.

2020 cybersecurity trends: 9 threats to watch

Here's how your biggest threats of 2019 will likely trend for 2020 and how you might change your defensive strategy for them.

browser security

How to secure your DNS traffic under Windows

DNS traffic is prone to snooping, and it’s often far too easy for attackers to hijack and change a company’s DNS settings. These simple steps will amp up your DNS protection.

API security alerts displayed on monitors amid binary code / application security

What you need to know about the new OWASP API Security Top 10 list

APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk.

browser security

How to lock down enterprise web browsers

Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately.

VPN security vulnerabilities  >  VPN alert / warning / network servers

6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

Enterprise VPNs might not always be as safe as you think. Be aware of these RCE vulnerabilities in popular enterprise VPN solutions.

train tracks converge / rails switch / paths merge / convergence / directory traversals

Directory traversal explained: Definition, examples and prevention

In a path traversal attack, also known as directory traversal, an attacker enters information in a web form, URL address line, or another input method that gives them access to a file or directory that they shouldn't have access to....

Japanese bowing etiquette / manners / digital connections

Improving BGP routing security by minding your MANRS

Enterprises can improve their routing security for modest costs, according to the Mutually Agreed Norms for Routing Security (MANRS) project.

secured network of computers with locks displayed on screens

Why giving users two separate systems won't improve security

Red/green systems, which give users one system for work and another for other tasks, no longer makes sense from a security and cost perspective. There are alternatives.

Microsoft's Chromium Edge browser

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know.

Chain links secure multiple data stream segments.

How MIT's Fiat Cryptography might make the web more secure

By automating the writing of cryptographic algorithms, Fiat Cryptography can remove errors, produce more secure code, and boost performance.

Load More