Network Security

Network Security news, information, and how-to advice

nordvpn
security code big data cyberespionage DDoS

IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

One of the biggest changes on the internet in the four years since his revelations about NSA surveillance is the growth in the use of encryption

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways

primary intro

Review: Threat hunting turns the tables on attackers

Game changing products from Sqrrl, Endgame, and Infocyte track down hidden Advanced Persistent Threats (APTs)

Netgear Nighthawk X10 Wi-Fi router 802.11ad

Netgear starts patching routers affected by a critical flaw

The company has identified eight affected models so far and has released beta firmware updates

Netgear Nighthawk X10 Wi-Fi router 802.11ad

An unpatched vulnerability exposes Netgear routers to hacking

The flaw allows hackers to execute arbitrary shell commands on affected devices

clock and calendar montage

Time is running out for NTP

Everyone benefits from Network Time Protocol, but the project struggles to pay its sole maintainer or fund its various initiatives

security code big data cyberespionage DDoS

More than 840,000 Cisco devices are vulnerable to NSA-related exploit

The vulnerability could allow hackers to extract potentially sensitive information from devices' memory

stop sign bullet holes

Emerging technologies are poking holes in security

Accelerated change challenges change management, security devops and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

segate central NAS

Thousands of Seagate NAS boxes host cryptocurrency mining malware

If configured for remote access, the devices expose a writable FTP directory to the Internet that attackers can abuse

open source alternatives routing firewall 1

Review: 5 open source alternatives for routers/firewalls

These open source products deliver simple routing and networking features like DHCP and DNS, plus, they are combined with security functionality

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco has released some fixed versions of its Adaptive Security Appliance firewalls, and more patches are expected

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

hunting orange

Fight back! Learn to hunt threats with free tools

Learn to detect malicious behavior by analyzing DNS and autoruns data with free and open source tools

airport utility mac icon

Apple fixes serious flaw in AirPort wireless routers

The flaw could allow hackers to execute malicious code on affected devices

20151005 cisco headquarters sign

Flaws expose Cisco RV series routers, firewalls to hacking

Attackers can take control of the affected devices by sending specifically crafted HTTP requests to them

symantec headquarters

Symantec to acquire Blue Coat for $4.65 billion

Greg Clark, CEO of Blue Coat, will head the combined security company

video

Early warning signs of a DDoS attack

At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence....

Load More