Network Security

Network security news, trends, analysis and practical advice

hacker, DDOS, IoT, SkilledAnalysts
mobile worker

Kim Komando offers flawed advice on router security

Despite her claim, updating the firmware is far from sufficient to keep out hackers


Android malware that can infiltrate corporate networks is spreading

An Android Trojan is spreading across app stores, including Google Play, and has the capability of stealing sensitive files from corporate networks.

security code big data cyberespionage DDoS

Armies of hacked IoT devices launch unprecedented DDoS attacks

The botnets made up of compromised IoT devices are now capable of launching distributed denial-of-service attacks of unprecedented scale.

sophos interecept x screenshot

Sophos rolls out Intercept X for endpoint protection

Sophos is coming out with Intercept X, its new name for endpoint protection that’s based on technology acquired when it bought SurfRight to broaden its endpoint strategy.

colorful neon networking background

Trouble spotted on the network

No sophisticated SOC? You can still be pretty sure that you’re aware of anything potentially troublesome.

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency.

home wifi wi fi router

A router security cheat sheet

There are many things that can be done to make a router more secure. Non techies need a shorter list than techies, but the Tech Guy recently offered a list that was way too short. And, many routers simply can not be made reasonably...

lawsuit judge law court decision sued

Information security ignorance is not a defense

Despite increasing awareness about the importance of information security, underscored by the fear of ransomware attacks, many in the small and medium business world are unprepared for an attack.

Great white shark

Use the internet? This Linux flaw could open you up to attack

A flaw in the Transmission Control Protocol (TCP) used by Linux since late 2012 poses a serious threat to internet users, whether or not they use Linux directly.

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

sean malone

Why the ‘cyber kill chain’ needs an upgrade

One of the most popular models for analyzing cyberattacks doesn’t focus enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las...

def con ftc slide

FTC seeks research help from DEF CON hackers

The Federal Trade Commission made an appeal at DEF CON in Las Vegas this past week in hopes of getting hackers to help them crack down on manufacturers and service providers that leave customers vulnerable.

microsoft headquarters

Microsoft fixes critical flaws in IE, Edge, Office and Windows print services

Microsoft's new batch of security patches fixes 47 vulnerabilities across its products, including in Internet Explorer, Edge, Office, Windows and the .NET Framework.

swift security breaches

SWIFT brings in external support as it fights wave of bank hacks

SWIFT is bringing in additional security support after a series of high-profile bank heists and attempted bank heists conducted via its financial transaction network.

TP-LINK lost control of two domains used to configure routers and Wi-Fi extenders

TP-LINK is no longer in control of or They do still control What does this mean to owners of TP-LINK devices? Probably not much.

Lessons and observations from the GoToMyPC incident

Citrix did not distinguish itself in the way it handled a recent security incident. Then too, neither did the press.

20160614 128 technology routing vendor ceo andy ory

Free network software might radically change how routing works

Startup 128 Technology is a fundamentally different approach to routing, one that the company says will make networking simpler and more secure.

Data analytics, big data, business, chart, laptop

Top-level domain expansion is a security risk for business computers

The explosion of new generic top-level domains (gTLDs) in recent years can put enterprise computers at risk due to name conflicts between domain names used inside corporate networks and domains that can now be registered on the public...

Load More