Network Security

Network Security news, information, and how-to advice

security code big data cyberespionage DDoS
stop sign bullet holes

segate central NAS

Thousands of Seagate NAS boxes host cryptocurrency mining malware

If configured for remote access, the devices expose a writable FTP directory to the Internet that attackers can abuse

open source alternatives routing firewall 1

Review: 5 open source alternatives for routers/firewalls

These open source products deliver simple routing and networking features like DHCP and DNS, plus, they are combined with security functionality

hollywood sign

Hollywood's 5 biggest hacking myths

Press Enter and watch the magic happen -- as if! Why does Hollywood's portrayal of hacking have to be so far off the mark?

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco has released some fixed versions of its Adaptive Security Appliance firewalls, and more patches are expected

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

hunting orange

Fight back! Learn to hunt threats with free tools

Learn to detect malicious behavior by analyzing DNS and autoruns data with free and open source tools

airport utility mac icon

Apple fixes serious flaw in AirPort wireless routers

The flaw could allow hackers to execute malicious code on affected devices

20151005 cisco headquarters sign

Flaws expose Cisco RV series routers, firewalls to hacking

Attackers can take control of the affected devices by sending specifically crafted HTTP requests to them

symantec headquarters

Symantec to acquire Blue Coat for $4.65 billion

Greg Clark, CEO of Blue Coat, will head the combined security company

computer data security keyboard hands programming developer

Defend yourself! Build a cyber security database

Attackers have all kinds of data about the threat landscape -- and about your organization, if it happens to be a target. Now's the time to arm yourself with data, too

hack hacker cyber thief theft stolen

You too? Who's on the hacker hit list

You don’t need to carry the keys to the enterprise network to have a malicious hacker tail you. Here’s who’s at risk and what to do about it

video

Early warning signs of a DDoS attack

At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence....

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world

security code big data cyberespionage DDoS

Empty DDoS threats earn extortion group over $100,000

There's no evidence that companies that declined to pay extortion fees to the Armada Collective were attacked, researchers say

hacker hacked threat

5 tips for defending against advanced persistent threats

APTs are increasing in occurrence and severity, as are the costs associated with protecting businesses adequately from. Is your organization prepared?

firewall

What users love (and hate) about 4 leading firewalls

Enterprise users weigh in on their favorite features and offer suggestions for improvement

A mug with the words GitHub Social Coding

19 open source GitHub projects for security pros

GitHub has a ton of open source options for security professionals, with new entries every day. Add these tools to your collection and work smarter

xx

Hacker: This is how I broke into Hacking Team

Account of the breach of surveillance vendor Hacking Team highlights lessons for all companies

Load More