Network Security

Network security news, trends, analysis and practical advice

Unlocked circuit board / security threat
MGM

Whitelisting project helps industrial control systems owners find suspicious files

Industrial control systems have been at the center of some scary security stories recently, but investigating malware infections in such environments isn't easy because analysts often having a hard time telling good files from...

Hacker

Iranian hackers compromised airlines, airports, critical infrastructure firms

For the past two years, a team of Iranian hackers has compromised computers and networks belonging to more than 50 organizations from 16 countries, including airlines, defense contractors, universities, military installations, and...

malware keyboard

New point-of-sale malware on underground markets for $2,000

A new kind of point-of-sale malware similar to the one that struck Target is being sold in underground markets for $2,000.

How can you stop a message you can't even see?

'Time cloak' could revolutionize fiber networks

Temporal cloaking can make your data invisible, block someone else's or make sure it's all delivered by disappearing static instead.

sony headquarters

Is hacking Sony torrents of fun for NORTH KOREA?

Has Sony Pictures become number one enemy of North Korea leader Kim Jong-un? Is his glorious Jong-un-ness angry about an upcoming and less-than-flattering movie called The Interview?

gop sony hack fake

Faked hack? #GOP pwns Sony networks with cheesy #SKULL

Guardians Of Peace want a piece of la SNE: We're told that Sony's entire network is on lockdown. But what's with the childish skull defacement and tone-deaf hashtag? In IT Blogwatch, bloggers sound ever-so-slightly suspicious.

ssl secure browser security lock

EFF, Mozilla back new authority that will offer free SSL certificates

A new organization supported by Mozilla, the Electronic Frontier Foundation and others is working to set up a new certificate authority that will provide website owners with free SSL/TLS certificates.

Microsoft will use Aorato buy to boost Active Directory protection

Microsoft plans to beef up Active Directory's security with machine learning technology from Aorato, the startup firm it has acquired.

computer hacker aa006208

Hackers are targeting execs on the road through hotel networks

For four years a group of sophisticated hackers has compromised the luxury hotel networks in the Asia-Pacific region to launch malware attacks against corporate executives and entrepreneurs traveling on business.

home depot

Home Depot lost 53 million email addresses (this POS story isn't getting any better)

Beware of phishing email 'from' Home Depot: Among the sorry story of stolen card details is the revelation that HD also leaked customers' email addresses. Oh, brother. In IT Blogwatch, bloggers hope their spam filters are up to the...

Wi-Fi traffic can be used as covert communication channel for malware

A security researcher has developed a tool to demonstrate how the unauthenticated data packets in the 802.11 wireless LAN protocol can be used as a covert channel to control malware on an infected computer.

Google releases tool to test apps and devices for SSL/TLS weaknesses

The tool simulates man-in-the-middle attacks to detect SSL/TLS vulnerabilities and implementation issues

malware keyboard

Attack campaign infects industrial control systems with BlackEnergy malware

Since 2011, companies that operate industrial control systems have been targeted by a group of attackers with a backdoor program called BlackEnergy.

Security vendor coalition cleans 43K malware infections used for cyberespionage

A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental...

Researcher creates proof-of-concept worm for network-attached storage devices

Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can...

Telco Systems lays groundwork for fewer management worries with virtual routers, firewalls

The company's platform lets service providers offer virtual router and firewalls

poodle ssl 3

POODLE poos on flaw (in SSL) as Google causes panic

SSL is attack dog when protocol-downgrade sinks teeth in leg: Google infosec researchers have found a new nasty TLS downgrade attack. While we all knew these old versions of SSL crypto were insecure, it's always been thought hard to...

Binary bomb with a lit fuse

Security experts warn of 'POODLE' attack against SSL 3.0

Google researchers have found a severe flaw in an obsolete but still used encryption software that could be exploited to steal sensitive data.

Load More