Skip the navigation

Network Security Topic Center

Network security news, features, advice and more to help you protect your IT systems

Network Security News

Home router security to be tested in Defcon contest

Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference.
Read more...

Flaw exposes some Cisco home wireless devices to hacking

Nine of Cisco's home and small office cable modems with router and wireless access point functionality need software updates to fix a critical vulnerability that could allow remote attackers to completely compromise them.

Botnet aims brute-force attacks at point-of-sale systems

Thousands of compromised computers are actively trying to break into point-of-sale (POS) systems using brute-force techniques to guess remote administration credentials.

New Havex malware variants target industrial control system, SCADA users

A malware threat previously used in attacks against energy sector companies is now being aimed at organizations that use or develop industrial applications and machines.

Ad network compromise leads to rogue page redirects on Reuters site

Users who accessed some stories on the Reuters website Sunday were redirected to a message from hackers criticizing the news agency's coverage of Syria.

Second Chinese army unit linked to corporate cyber-espionage

A Chinese hacking group that has attacked U.S. and European aerospace and communications companies is almost certainly linked to the Chinese military, a U.S. Internet security company said Monday.

Global mobile roaming hub accessible from the Internet and vulnerable, researchers find

The GPRS Roaming Exchange (GRX) network, which carries roaming traffic among hundreds of mobile operators worldwide, contains Internet-reachable hosts that run vulnerable and unnecessary services, recent security scans reveal.

New attack methods can 'brick' systems, defeat Secure Boot, researchers say

The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can be bypassed on around half of computers that have the feature enabled in order to install bootkits, according to a security researcher.

More security woes keep eBay on edge

EBay';s security team isn't going to get a break for a while.

Point-of-sale attacks accounted for a third of all data breaches in 2013

A third of data breaches investigated by security firm Trustwave last year involved compromises of point-of-sale (PoS) systems and over half of all intrusions targeted payment card data.

Network Security In Depth

Evan Schuman: The data dangers of free public Wi-Fi

New York's plan to turn pay phones into free Wi-Fi stations could be a template for other cities, and bad news for IT departments trying to protect corporate data and intellectual property.

11 signs you've been hacked -- and how to fight back

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned

Developing a smart approach to SMAC security

Few security executives at global enterprises--or even at smaller organizations--have not had to deal with issues related to social media, mobile technology, big data/analytics, or cloud computing.

The use of mobile credentials is on the rise, but can they be secured?

Given the current prevalence of mobile devices, especially smartphones, it comes as no surprise that they are becoming more and more entwined with everyday aspects of our lives. We don't just use them to make calls, to text, or to browse the internet anymore. We can use them to do just about anything, and that includes using them as a means to provide our credentials.

Needed: Breach detection correction

There is no shame in being breached by a cyber attack -- security experts are unanimous about that. Prevention, while a worthy part of a risk management strategy, will never be 100% successful, given the sophistication and overwhelming volume of attacks.

U.S. set to charge Chinese military officials with hacking

The U.S. Department of Justice is preparing to charge Chinese military officials with hacking US companies to obtain trade secrets.

Stop using Internet Protocol Version 4!

Four reasons to move entirely to IPv6. (Insider; registration required)

Self-taught hackers rule

Ilio Kolochenko, CEO of High-Tech Bridge, a Swiss information security company, gave the keynote address on governments' role in cybersecurity this past Sunday at the Regional cybersecurity Summit in Oman.

How to rethink security for the new world of IT

Not all the proven practices of the past work in today's interconnected, heterogeneous world. Here's what you need to do differently

How to roll your own VPN

With free open source OpenVPN and a low-cost VPS, you can have a secure connection from any location