Skip the navigation

Network Security Topic Center

Network security news, features, advice and more to help you protect your IT systems

Network Security News

Satellite communication systems are rife with security flaws, vulnerable to hackers

Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
Read more...

Users face serious threat as hackers take aim at routers, embedded devices

Home routers and other consumer embedded devices are plagued by basic vulnerabilities and can't be easily secured by non-technical users, which means they'll likely continue to be targeted in what has already become an increasing trend of mass attacks.

Attack hits Web servers with outdated Linux kernels

Web servers running a long-outdated version of the Linux kernel were attacked with dramatic speed over two days last week, Cisco Systems said on Thursday.

Bitcoin-stealing malware hidden in Mt. Gox data dump, researcher says

An archive containing transaction records from Mt. Gox that was released on the Internet last week by the hackers who compromised the blog of Mt. Gox CEO Mark Karpeles also contains bitcoin-stealing malware for Windows and Mac.

Cisco patches flaws in routers, wireless LAN controllers

Cisco Systems released new firmware versions for some of its small business routers and wireless LAN controllers in order to address vulnerabilities that could allow remote attackers to compromise the vulnerable devices or affect their availability.

Network firewalls aren't dead yet

Phil Cummings says network firewalls will continue to be a critical piece of Health Information Technology Services -- Nova Scotia security portfolio for one simple reason: nothing's come along to replace them.

Gameover malware is tougher to kill with new rootkit component

A new variant of the Gameover malware that steals online banking credentials comes with a kernel-level rootkit that makes it significantly harder to remove, according to security researchers from Sophos.

IE zero-day exploit being used in widespread attacks

The number of attacks exploiting a yet-to-be-patched vulnerability in Internet Explorer has increased dramatically over the past few days, indicating the exploit is no longer used just in targeted attacks against particular groups of people.

Database attack exposes personal data at University of Maryland

Personal records for more than 309,000 students and staff were exposed this week in a "sophisticated" database attack at the University of Maryland, the university said Wednesday.

There's now an exploit for 'TheMoon' worm targeting Linksys routers

Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models.

Network Security In Depth

Self-taught hackers rule

Ilio Kolochenko, CEO of High-Tech Bridge, a Swiss information security company, gave the keynote address on governments' role in cybersecurity this past Sunday at the Regional cybersecurity Summit in Oman.

How to rethink security for the new world of IT

Not all the proven practices of the past work in today's interconnected, heterogeneous world. Here's what you need to do differently

How to roll your own VPN

With free open source OpenVPN and a low-cost VPS, you can have a secure connection from any location

'HoneyDocs' lays irresistible bait for hackers

Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.

Hacked burger tweets draw cybercrowds

"There's no such thing as bad publicity"

Chinese Government's Link to Cyber Espionage Clearer Than Ever

It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.

Unseen, all-out cyber war on the U.S. has begun

Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet

Samba 4 review: No substitute for Active Directory -- yet

Samba's open source alternative to Microsoft's domain controller is a good start, but not ready for prime time

What developers can learn from Anonymous

The reason Anonymous has a permanent place in our collective imagination: For a time, its organizational model worked very well

ATM fraud refunds may not come quickly, if at all

In early April, A$800 vanished from my account, the result of a late-night withdrawal from a cash machine in a Sydney neighborhood I'd never been to before.