Network Security

Network security news, trends, analysis and practical advice

Android apps
Wi-Fi router

Mobile security illustration

Software detects fake mobile, Wi-Fi networks

An Israeli company has developed a product it says can detect if a mobile device connects to a fake cellular base station or Wi-Fi access point, potentially protecting critical data from falling into the hands of hackers.

video

Disrupt - Cloudwear

Interview with Evan Tann, CEO of Cloudwear, at Techcrunch Disrupt.

Never Give Up

Are we surrendering the cyberwar?

There is a growing sentiment in the information security world today that since it is impossible to completely keep hackers out of business networks, we should throw in the towel and just focus on protecting data. While safeguarding...

signpost and big ben

To get more secure, first figure out where you want to go

If you don’t ask the right questions, you could end up with protection that doesn’t take care of your real problems.

Web app attacks, PoS intrusions and cyberespionage top causes of data breaches

Web application attacks, point-of-sale intrusions, cyberespionage and crimeware were the leading causes of confirmed data breaches last year.

blind mans buff

Discovering a blind eye to vulnerabilities

A scanner that doesn’t have the proper permissions is going to miss a lot of vulnerabilities. Why did I have to learn this the hard way?

navy lookout

With greater visibility comes increased response

As our manager tests an advanced firewall, several events that would have gone undetected come to light.

031615 wi fi 1

This tool can warn you about evil access points nearby

A new open-source tool can periodically scan for rogue Wi-Fi access points and alert network administrators if they're found.

internet security with lock

Like Google, Mozilla set to punish Chinese agency for certificate debacle

The Mozilla Foundation plans to reject new digital certificates issued by the China Internet Network Information Center in its products, but will continue to trust certificates that already exist.

fingers typing keyboard dramatic lighting programmer hacker

Lebanese cyberespionage campaign hits defense, telecom, media firms worldwide

For the past two years, a cyberespionage group that likely operates from Lebanon has hacked into hundreds of defense contractors, telecommunications operators, media groups and educational organizations from at least 10 countries.

internet security thinkstock 1200w

Microsoft blacklists fraudulently issued SSL certificate

Microsoft released an update to blacklist an SSL certificate for one of its domain names that was issued to an unauthorized third party.

Tool allows account hijacking on sites that use Facebook Login

Attackers can force users to associate their accounts on other sites with malicious Facebook accounts

cybercrime

OpenDNS trials system that quickly detects computer crime

A security system undergoing testing by a San-Francisco-based company aims to speed up the detection of websites and domains used for cybercrime.

firehose

Information overload, SIEM version

Our manager is very happy with the performance of his security information and event management platform, but sometimes it’s too much for the network bandwidth. Fortunately, an easy fix is at hand.

patch bandage band-aid first-aid ouch cure remedy

Critical remote code execution flaw patched in Samba

Security researchers are urging users to install new Samba security updates in order to address a critical vulnerability that allows attackers to execute arbitrary code with root privileges.

Hacking stealing password data

Many attackers lurk undetected for months, then pounce

Attackers who penetrate company networks often pose as legitimate users for long periods of time, causing lengthy delays before victims figure out they've been hacked.

encryption

NSA director wants gov't access to encrypted communications

It probably comes as no surprise that the director of the National Security Agency wants access to encrypted data on computers and other devices. The U.S. should be able to craft a policy that allows the NSA and law enforcement...

cybersecurity stock image

'Secure' advertising tool PrivDog compromises HTTPS security

New cases of insecure HTTPS traffic interception are coming to light as researchers investigate software programs for implementations that could enable malicious attacks. The latest software to open a man-in-the-middle hole on users'...

Load More