Network->General

B64e021126c832bb29ec9fa988155eaf

Mana Tutorial: The Intelligent Rogue Wi-Fi Router

October 21, 2014 Added by:Dan Dieterle

Like other rogue Wi-Fi AP programs Mana creates a rogue AP device, but Mana does so much more.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why Two-Factor Authentication is Too Important to Ignore

October 21, 2014 Added by:Patrick Oliver Graf

Going forward, we have to be prepared for the possibility that private information provided to a third party, like a merchant or a public agency, will be stolen.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

When Remote Access Becomes Your Enemy

October 16, 2014 Added by:Patrick Oliver Graf

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Security Companies Hit Hikit Backdoor Used by APT Group

October 16, 2014 Added by:Brian Prince

A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

SandWorm Hacking Team Exploited 0-day Against NATO and Other Government Entities

October 14, 2014 Added by:Pierluigi Paganini

According to a new report issued by the cyber security firm iSIGHT Partners, a group of Russian hackers has been exploiting a previously unknown flaw in Microsoft’s Windows operating system to spy on NATO, the Ukrainian government, a U.S. university researcher and many other entities.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security Lessons from Complex, Dynamic Environments

October 14, 2014 Added by:Rafal Los

Security is hard, folks.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Shellshock Leaves Deep Impact on Network Security

October 09, 2014 Added by:Patrick Oliver Graf

For the last 30 years, a common line of code found in a piece of software has quietly been a dormant security vulnerability – but now, news of the exploit has gone public, sending the network security community into reaction mode.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

What Is ICS Cybersecurity – You Don't Need Digital Assets

October 08, 2014 Added by:Joe Weiss

I have a great concern about many people in nuclear (and other) industries only focusing on malicious cyber attacks to the exclusion of unintentional cyber incidents.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Network Security for CIOs: A Marathon or a Sprint?

October 02, 2014 Added by:Patrick Oliver Graf

The world of IT is going through the same transition, away from the traditional support of “marathoning” to meet goals.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Patch for ShellShock ASAP!

September 30, 2014 Added by:Brent Huston

Source IPs for probes looking for the vulnerability are growing slowly in number and scope of scans. (As of 9/30/14, 10am Eastern).

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

What We Know About Shellshock and Why the Bash Bug Matters

September 26, 2014 Added by:InfosecIsland News

Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

New Bash Bug Could Wreak Havoc on Linux and OS X Systems

September 25, 2014 Added by:Malwarebytes

It would have been hard to imagine anything as bad as the HeartBleed bug was going to happen but the recent discovery of a flaw in the popular bash command shell very well could be.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

A Tenuous Grasp on Reality

September 23, 2014 Added by:Wendy Nather

One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.

Comments  (1)

457ad4752923de991424e3d0f5a6abb6

Shining a Light on Industrial Control Networks with Purpose Built Intrusion Detection Systems

September 16, 2014 Added by:Nate Kube

There are differences between industrial control systems and enterprise IT networks resulting in different security needs. To protect industrial networks, system operators must opt for an industrial next gen firewall with an IDS that fully understands industrial protocols and the specific context of each industrial command.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Cyber Security and the Electric Grid – It IS a Problem

September 15, 2014 Added by:Joe Weiss

The electric grid has been, and continues to be, susceptible to unintentional and malicious cyber incidents.

Comments  (9)

B42221fcb8abc51212416aab3b29468f

Using Network Intelligence to Turn the Table on Hackers

September 15, 2014 Added by:Greg Akers

Teams that use intelligence inherent in the network will gain insight into how cyber actors operate and how to quickly shut them down.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »