Network Security

Network security news, trends, analysis and practical advice

home wifi wi fi router
lawsuit judge law court decision sued

Great white shark

Use the internet? This Linux flaw could open you up to attack

A flaw in the Transmission Control Protocol (TCP) used by Linux since late 2012 poses a serious threat to internet users, whether or not they use Linux directly.

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

sean malone

Why the ‘cyber kill chain’ needs an upgrade

One of the most popular models for analyzing cyberattacks doesn’t focus enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las...

def con ftc slide

FTC seeks research help from DEF CON hackers

The Federal Trade Commission made an appeal at DEF CON in Las Vegas this past week in hopes of getting hackers to help them crack down on manufacturers and service providers that leave customers vulnerable.

microsoft headquarters

Microsoft fixes critical flaws in IE, Edge, Office and Windows print services

Microsoft's new batch of security patches fixes 47 vulnerabilities across its products, including in Internet Explorer, Edge, Office, Windows and the .NET Framework.

swift security breaches

SWIFT brings in external support as it fights wave of bank hacks

SWIFT is bringing in additional security support after a series of high-profile bank heists and attempted bank heists conducted via its financial transaction network.

TP-LINK lost control of two domains used to configure routers and Wi-Fi extenders

TP-LINK is no longer in control of tplinklogin.net or tplinkextender.net. They do still control tplinklogin.net. What does this mean to owners of TP-LINK devices? Probably not much.

Lessons and observations from the GoToMyPC incident

Citrix did not distinguish itself in the way it handled a recent security incident. Then too, neither did the press.

20160614 128 technology routing vendor ceo andy ory

Free network software might radically change how routing works

Startup 128 Technology is a fundamentally different approach to routing, one that the company says will make networking simpler and more secure.

Data analytics, big data, business, chart, laptop

Top-level domain expansion is a security risk for business computers

The explosion of new generic top-level domains (gTLDs) in recent years can put enterprise computers at risk due to name conflicts between domain names used inside corporate networks and domains that can now be registered on the public...

20151005 Cisco headquarters sign

Cisco patches high-severity flaws in its Web Security Appliance

Cisco Systems has fixed four denial-of-service vulnerabilities that attackers could exploit to cause Web Security Appliance devices to stop processing traffic correctly.

iphone security

Opera offers iPhone users free VPN, with strings attached

Opera Software yesterday released a free VPN app for Apple's iOS.

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...

video

Early warning signs of a DDoS attack

At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence....

CSO Identity Management Survival Guide cover image

The CSO identity management survival guide

Research firm Gartner says identity management is "a crucial undertaking for any enterprise." This guide will help you communicate the challenges, learn from success stories and dive into the most valuable features of today's identity...

20160225 stock mwc ericsson booth security locks

This startup uses math to show whether your network is safe

How do you know your network is safe from attacks and failures? Veriflow, a startup with backing from the U.S. Defense Department, says it can make sure.

generic image of a wi-fi router

New firmware analysis framework finds serious flaws in Netgear and D-Link devices

A team of security researchers found serious vulnerabilities in more than a dozen wireless routers and access points from Netgear and D-Link with the help of an open-source framework that can be used to perform dynamic security...

train wreck at montparnasse

Identifying the security pitfalls in SDN

While a software-defined network can improve application performance and help ease administrative tasks, it can also create new vulnerabilities. Experts offer advice for security teams.

Load More