Network Security

Network Security news, information, and how-to advice

hunting orange
airport utility mac icon

20151005 cisco headquarters sign

Flaws expose Cisco RV series routers, firewalls to hacking

Attackers can take control of the affected devices by sending specifically crafted HTTP requests to them

symantec headquarters

Symantec to acquire Blue Coat for $4.65 billion

Greg Clark, CEO of Blue Coat, will head the combined security company

computer data security keyboard hands programming developer

Defend yourself! Build a cyber security database

Attackers have all kinds of data about the threat landscape -- and about your organization, if it happens to be a target. Now's the time to arm yourself with data, too

hack hacker cyber thief theft stolen

You too? Who's on the hacker hit list

You don’t need to carry the keys to the enterprise network to have a malicious hacker tail you. Here’s who’s at risk and what to do about it

video

Early warning signs of a DDoS attack

At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence....

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world

security code big data cyberespionage DDoS

Empty DDoS threats earn extortion group over $100,000

There's no evidence that companies that declined to pay extortion fees to the Armada Collective were attacked, researchers say

hacker hacked threat

5 tips for defending against advanced persistent threats

APTs are increasing in occurrence and severity, as are the costs associated with protecting businesses adequately from. Is your organization prepared?

firewall

What users love (and hate) about 4 leading firewalls

Enterprise users weigh in on their favorite features and offer suggestions for improvement

A mug with the words GitHub Social Coding

19 open source GitHub projects for security pros

GitHub has a ton of open source options for security professionals, with new entries every day. Add these tools to your collection and work smarter

xx

Hacker: This is how I broke into Hacking Team

Account of the breach of surveillance vendor Hacking Team highlights lessons for all companies

fave raves primary

5 must-have network tools

IT pros are bullish on these five products

20160225 stock mwc ericsson booth security locks

This startup uses math to show whether your network is safe

Veriflow uses a verification system from the space program to study all possible data paths

mit wireless localizer

New wireless tech from MIT promises password-free Wi-Fi

Chronos system developed by researchers at MIT’s Computer Science and Artificial Intelligence Lab could also help make smart homes smarter

honey pot

Spread honeypots over your defense plan

Deployed properly, a honeypot catches intruders like flies to, well, you know what. They deliver enormous value for a modicum of up-front effort

submarine periscope 101722825

Google Submariner surfaces untrusted certificate authorities

Google calls out certificate authorities that can no longer be trusted and helps you steer clear of potentially fraudulent credentials

clicks pageviews traffic denial of service ddos attack

Rise in malicious domains portends rise in attacks

The Infoblox DNS Threat Index surged in the fourth quarter of 2015, showing that attackers are stepping up DNS-based activities

tor

Tor Project says it can quickly catch spying code

The organization has worked for three years to improve its ability to catch fraudulent software

Load More