Network Security

Network Security news, information, and how-to advice

fire flames hot heat light flicker
circles of light network centralized radar concentric web crop

network security diagram 42 25789247

Detect network anomalies with StealthWatch

Searching for a great network traffic flow analysis tool that detects sneak hacker attacks? Look no further than Lancope's StealthWatch

windows wifi

How to set up 802.1X client settings in Windows

802.1X provides security for wired and Wi-Fi networks

Mistakes

10 security mistakes that will get you fired

From killing critical business systems to ignoring a critical security event, these colossal slip-ups will get your career in deep water quick

Report: LulzSec leader directed cyber attacks while working for FBI

Hector Xavier Monsegur directed attacks against targets in the UK, Australia, Brazil, and other countries

Cisco, Oracle find dozens of their products affected by Shellshock

Cisco has identified 71 products vulnerable to Shellshock and Oracle 51, but the number is likely to increase

How network virtualization is used as a security tool

As VMware sells its network virtualization software, it's finding that security is a big driver for adoption

Sprint, Windstream traffic routing errors hijacked other ISPs

The errors, which can shut off traffic, are occurring more frequently with little explanation, said Renesys

Netcore, Netis routers at serious risk from hardcoded passwords

More than two million of the devices on the Internet may be vulnerable to hackers monitoring their Internet traffic, Trend Micro says

McAfee sideshow eclipses Defcon's real security breakthroughs

The security pioneer's appearance at Defcon highlighted the best and worst impulses of the hacker community

Emerging networking technology used by Apple, Cisco will frustrate firewalls

Multipath TCP improves network performance and resiliency but hampers security such as firewalls and deep packet inspection

Network-attached storage devices more vulnerable than home routers

A security review found serious vulnerabilities in 10 popular NAS systems from multiple manufacturers

Cisco patches traffic snooping flaw in its networking gear

The vulnerability affects the OSPF routing protocol implementation on Cisco networking equipment

11 signs you've been hacked -- and how to fight back

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned

Prove it! Another security vendor claims 100 percent malware detection

A long line of security vendors has promised to detect all malware. Every last one failed. Can Trustwave break the mold?

Two glimmers of hope for enterprise security

Will the endless stream of security compromises ever stop? No single security product can deliver salvation, but two new solutions, PingID and Tanium, show real promise

Step-by-step guide to documenting your network

Network documentation isn't sexy, but it's a vital component of keeping your network safe and secure

The worst data breaches of 2014 ... so far

We're only a third of the way through the year, and hackers have already had their way with all matter of security systems

7 reasons to deploy Wi-Fi security in Enterprise mode

SMBs may find the Personal mode of Wi-Fi security easier to deploy, but that may be a costly mistake

Load More