January 13, 2020
Via: Help Net SecurityThe total number of 5G connections will reach 1.5 billion globally by 2025, rising from only 5 million in 2019, according to Juniper Research. This is an annual average growth of 150% over the next 6 years. The new study […]
Threats & Malware, Vulnerabilities
January 3, 2020
Via: Security AffairsCisco has released software updates that address several critical and high-severity vulnerabilities in its Data Center Network Manager (DCNM) product. All the vulnerabilities were reported to Cisco through Trend Micro’s Zero Day Initiative (ZDI) and Accenture’s iDefense service by the […]
December 19, 2019
Via: Help Net SecurityThe number of 5G connections is forecast to grow from roughly 10 million in 2019 to 1.01 billion in 2023, IDC reveals. This represents a compound annual growth rate (CAGR) of 217.2% over the 2019-2023 forecast period. By 2023, 5G […]
December 13, 2019
Via: Help Net SecurityAmid significant increases in both malware and network attacks, multiple Apache Struts vulnerabilities – including one used in the devastating Equifax data breach – appeared for the first time on WatchGuard’s list of most popular network attacks in Q3 2019. […]
December 4, 2019
Via: Help Net SecurityThe Domain Name System (DNS) is a cornerstone of the internet. DNS servers connect URL names that humans can read to unique Internet Protocol (IP) addresses that web browsers can understand. Without DNS, we’d all be typing in long, seemingly […]
December 2, 2019
Via: Help Net SecuritySlowly but surely, 5G digital cellular networks are being set up around the world. It will take years for widespread coverage and use to be achieved, so what better time than now for finding a way to ease into it […]
November 22, 2019
Via: Dark ReadingBot detection over IP networks isn’t easy, but it’s becoming a fundamental part of network security practice. With the rise of security breaches using malware, ransomware, and other remote access hacking tools, identifying malicious bots operating on your network has […]
November 20, 2019
Via: William PalmerKeeping your data safe has never been more crucial than now. Whether it’s a large enterprise or a small business, Virtual Private Networks (VPNs) are a must for employees who travel frequently or work often on public Wi-Fi and need […]
November 8, 2019
Via: Help Net SecurityImagine a world where complexity is no longer the top issue on the minds of CISOs as they think about their security architectures, and a time when they no longer have to stitch together and manage multi-vendor environments. Cisco announced […]
November 8, 2019
Via: Help Net SecurityFewer than half (47%) of cybersecurity professionals have a plan in place to deal with attacks on their IoT devices and equipment, despite the fact that nine out of ten express concerns over future threats, according to the Neustar International […]
October 24, 2019
Via: Help Net SecurityNorth America is one of the most advanced mobile regions in the world – a result of significant operator investments in 5G. 5G is coming The 2019 North America edition of the GSMA’s Mobile Economy report series forecasts that almost […]
Threats & Malware, Vulnerabilities
October 7, 2019
Via: Help Net SecurityCisco has fixed 18 high-impact vulnerabilities affecting several of its security offerings and is advising administrators to test and implement the offered security updates as soon as possible. “Successful exploitation of the vulnerabilities could allow an attacker to gain unauthorized […]
Malware, Mobile security, Vulnerabilities
September 27, 2019
Via: Threat PostWhen it comes to the next generation of mobile networks, 5G promises a more Internet of Things-friendly ecosystem with vast improvements over the current capabilities of 4G – however, its intersection with IoT will also raise the stakes on cybersecurity. […]
Mobile security, Vulnerabilities
September 27, 2019
Via: Security WeekEarlier this month, cyber telecoms security firm AdaptiveMobile Security disclosed the details of Simjacker, an attack method that involves sending specially crafted SMS messages to the targeted mobile phone. The attack relies on the fact that these special messages are […]
Network security, Security, Threats & Malware, Vulnerabilities
September 10, 2019
Via: Dark ReadingThe North American Electric Reliability Corporation (NERC) reports that a cyberattack on the US power grid earlier this year was caused by a target entity’s network perimeter firewall flaw. On March 5, 2019, an incident targeted a “low-impact” grid control […]
September 4, 2019
Via: Help Net SecurityIn this Help Net Security podcast, Kevin Sheu, VP Product Marketing and Marcus Hartwig, Senior Product Marketing Manager at Vectra AI, discuss the Vectra superhero survey from Black Hat USA 2019, which provides insight into the current cloud adoption and […]
Mobile security, Network security, Security
September 4, 2019
Via: Threat PostWhen it comes to what we can expect with 5G mobile networks, they promise a more IoT friendly ecosystem, with vast improvements over the current capabilities of the 4G. Providing ultra low-latency and exponentially faster throughput (along with sensors that […]
August 22, 2019
Via: Help Net SecurityThere is no greater security risk to an organization than a threat actor that knows how to operate under the radar. Malicious insiders and external cybercriminals are getting savvier. They are better at blending in without tripping any alerts. They […]
August 14, 2019
Via: Security IntelligenceLike rust, risk never sleeps. As mobile devices flood the enterprise (especially for a younger generation of workers), the internet of things (IoT) expands, and cybercriminals grow in both numbers and sophistication, many security professionals think zero trust is the […]
Mobile security, Network security, Security
July 25, 2019
Via: Security WeekBuilding upon existing 4G Long-Term Evolution (LTE) infrastructure, 5G is designed to improve bandwidth, capacity, and reliability of wireless broadband services. The technology is intended to meet increasing data and communication requirements, offering capacity for tens of billions of connected […]