Network Security

Network security news, trends, analysis and practical advice

security analytics

Blame the ISPs rather than the routers

The latest attacks on routers show Internet Service Providers failed in multiple ways.


hpe hewlett packard enterprise palo alto headquarters office

HPE rolls out products to enable IoT adoption

Hewlett Packard Enterprise announced several software and hardware products to more securely manage the exploding universe of Internet of Things devices.

security code big data cyberespionage DDoS

Upgraded Mirai botnet disrupts Deutsche Telekom by infecting routers

A new version of Mirai -- a malware that’s been enslaving poorly secured IoT devices -- has found a new victim: vulnerable internet routers from Germany’s Deutsche Telekom.

padlock unlocked security hole flaw

Japanese government denies report that its defense forces were hacked

Japanese government officials have denied reports that a secure network used by the country's defense forces was attacked earlier this year.

20160224 stock mwc smartphone user in suit

Hackers can abuse LTE protocols to knock phones off networks

The new Diameter protocol that LTE mobile networks use to communicate with each other can still be abused to launch attacks against users if operators don't take additional security measures, researchers showed.

digital swirl

Gartner: Despite DDoS attacks, don’t give up on Dyn or DNS service providers

The DDoS attacks that flooded Dyn and knocked high-profile Web sites offline don’t mean businesses should abandon DNS service providers, in fact they should use more than one DNS provider for redundancy.

hacker, DDOS, IoT, SkilledAnalysts

DDoS attack against Dyn could indicate a new use of old criminal tech

Attacks against DNS service provider Dyn resumed after a two-and-a-half hour lull, and could indicate a new application of an old criminal technology, experts say.

mobile worker

Cybersecurity Awareness Month tips for online security

Precautions to ponder during this special month -- with some help from the FBI

Kim Komando offers flawed advice on router security

Despite her claim, updating the firmware is far from sufficient to keep out hackers

dresscode

Android malware that can infiltrate corporate networks is spreading

An Android Trojan is spreading across app stores, including Google Play, and has the capability of stealing sensitive files from corporate networks.

security code big data cyberespionage DDoS

Armies of hacked IoT devices launch unprecedented DDoS attacks

The botnets made up of compromised IoT devices are now capable of launching distributed denial-of-service attacks of unprecedented scale.

sophos interecept x screenshot

Sophos rolls out Intercept X for endpoint protection

Sophos is coming out with Intercept X, its new name for endpoint protection that’s based on technology acquired when it bought SurfRight to broaden its endpoint strategy.

colorful neon networking background

Trouble spotted on the network

No sophisticated SOC? You can still be pretty sure that you’re aware of anything potentially troublesome.

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency.

home wifi wi fi router

A router security cheat sheet

There are many things that can be done to make a router more secure. Non techies need a shorter list than techies, but the Tech Guy recently offered a list that was way too short. And, many routers simply can not be made reasonably...

lawsuit judge law court decision sued

Information security ignorance is not a defense

Despite increasing awareness about the importance of information security, underscored by the fear of ransomware attacks, many in the small and medium business world are unprepared for an attack.

Great white shark

Use the internet? This Linux flaw could open you up to attack

A flaw in the Transmission Control Protocol (TCP) used by Linux since late 2012 poses a serious threat to internet users, whether or not they use Linux directly.

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

sean malone

Why the ‘cyber kill chain’ needs an upgrade

One of the most popular models for analyzing cyberattacks doesn’t focus enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las...

Load More