Network Security

Network Security news, information, and how-to advice

computer data security keyboard hands programming developer
hack hacker cyber thief theft stolen

video

Early warning signs of a DDoS attack

At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence....

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world

security code big data cyberespionage DDoS

Empty DDoS threats earn extortion group over $100,000

There's no evidence that companies that declined to pay extortion fees to the Armada Collective were attacked, researchers say

hacker hacked threat

5 tips for defending against advanced persistent threats

APTs are increasing in occurrence and severity, as are the costs associated with protecting businesses adequately from. Is your organization prepared?

firewall

What users love (and hate) about 4 leading firewalls

Enterprise users weigh in on their favorite features and offer suggestions for improvement

A mug with the words GitHub Social Coding

19 open source GitHub projects for security pros

GitHub has a ton of open source options for security professionals, with new entries every day. Add these tools to your collection and work smarter

spying eye cyberespionage surveillance

Hacker: This is how I broke into Hacking Team

Account of the breach of surveillance vendor Hacking Team highlights lessons for all companies

fave raves primary

5 must-have network tools

IT pros are bullish on these five products

20160225 stock mwc ericsson booth security locks

This startup uses math to show whether your network is safe

Veriflow uses a verification system from the space program to study all possible data paths

mit wireless localizer

New wireless tech from MIT promises password-free Wi-Fi

Chronos system developed by researchers at MIT’s Computer Science and Artificial Intelligence Lab could also help make smart homes smarter

honey pot

Spread honeypots over your defense plan

Deployed properly, a honeypot catches intruders like flies to, well, you know what. They deliver enormous value for a modicum of up-front effort

submarine periscope 101722825

Google Submariner surfaces untrusted certificate authorities

Google calls out certificate authorities that can no longer be trusted and helps you steer clear of potentially fraudulent credentials

clicks pageviews traffic denial of service ddos attack

Rise in malicious domains portends rise in attacks

The Infoblox DNS Threat Index surged in the fourth quarter of 2015, showing that attackers are stepping up DNS-based activities

tor

Tor Project says it can quickly catch spying code

The organization has worked for three years to improve its ability to catch fraudulent software

generic image of a wi-fi router

New firmware analysis framework finds serious flaws in Netgear and D-Link devices

The framework's creators used it to find vulnerabilities in 887 firmware images

train wreck at montparnasse

Identifying the security pitfalls in SDN

While a software-defined network can improve application performance and help ease admin tasks, it can also create new vulnerabilities

20151005 cisco headquarters sign

Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking

Firewalls running Cisco Adaptive Security Appliance (ASA) software can be compromised remotely with malformed UDP packets

Rajeev Suri

Nokia's IoT security tool takes in the whole network

The NetGuard platform is designed to work with any vendor's network equipment

Load More