Advertisement
Top

Tag: Network


Mobile security, Network security, Security

U.S. Warns of 5G Wireless Network Security Risks

July 25, 2019

Via: Security Week

Building upon existing 4G Long-Term Evolution (LTE) infrastructure, 5G is designed to improve bandwidth, capacity, and reliability of wireless broadband services. The technology is intended to meet increasing data and communication requirements, offering capacity for tens of billions of connected […]


Vulnerabilities

Death of the VPN: Enterprise Security Needs New Foundations

June 28, 2019

Via: Threat Post

Introduced to the market nearly two decades ago, enterprise VPN technology has been uniquely enduring. Most large organizations still employ a VPN solution, and many seem to rely on it unquestioningly to provide secure remote access. It’s a rarefied position […]


Network security

Organizations need greater visibility into network activity

June 27, 2019

Via: Help Net Security

One of the biggest challenges for all organizations was a lack of agility, making it difficult for their teams to investigate and respond quickly and accurately to security threats or outages, according to Endace. The study Challenges of Managing and […]


Network security

41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025

June 21, 2019

Via: Help Net Security

The number of devices connected to the Internet, including the machines, sensors, and cameras that make up the Internet of Things (IoT), continues to grow at a steady pace. A new forecast from IDC estimates that there will be 41.6 […]


Malware

Botnets shift from Windows towards Linux and IoT platforms

June 20, 2019

Via: Help Net Security

Botnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered significant changes taking place in the coding of malware used to create bots, operations, and […]


Malware, Phishing

Criminals are selling hacking services targeting world’s biggest companies

June 7, 2019

Via: Help Net Security

A new study – undertaken by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, and underwritten by Bromium – provides details of first-hand intelligence gathered from covert discussions with dark net vendors, alongside analysis by a […]


Cloud security, Network security, Security

IoT Security Regulation is on the Horizon

June 6, 2019

Via: Threat Post

Internet of things (IoT) device security continues to worry the tech industry – however, experts believe that the right type of global regulation could be key for ensuring security standards. The question is when those regulatory efforts will be fleshed […]


Cyber warfare, Cyber-crime

Chinese Cyber-Spies Target Government Organizations in Middle East

May 29, 2019

Via: Security Week

Also tracked as APT27, TG-3390, Bronze Union, and Lucky Mouse, the threat group has been active since at least 2010, targeting hundreds of organizations worldwide, including U.S. defense contractors, financial services firms, a European drone maker, and a national data […]


Network security, Threats & Malware, Vulnerabilities

Security spring cleaning: 5 tips for tidying up network safeguards

May 15, 2019

Via: Help Net Security

Networks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t regularly review your network, potential weaknesses and vulnerabilities will stack up. […]


Vulnerabilities

Critical Flaw in Cisco Elastic Services Controller Allows Full System Takeover

May 8, 2019

Via: Threat Post

A critical vulnerability in the Cisco Elastic Services Controller could allow an unauthenticated, remote attacker to take full control of impacted systems – merely by sending a crafted request. Cisco Elastic Services Controller is a virtual network functions manager, which […]


Mobile security, Network security, Security

Mobile carriers believe security and reliability concerns will increase with 5G

May 8, 2019

Via: Help Net Security

Mobile service providers anticipate significant new revenue opportunities from the coming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they also believe much-improved security will be essential to realizing that potential. A new global […]


Network security

Extinguishing the IoT Insecurity Dumpster Fire

May 7, 2019

Via: Threat Post

It’s no secret IoT security has been a dumpster fire. Last week, it was reported two million IP security cameras, baby monitors and smart doorbells have serious IoT flaws with no known patches. The list, of course, is added to […]


Network security

Citrix confirmed hackers had access to its network for five months

May 2, 2019

Via: Security Affairs

In March, the American multinational software company Citrix disclosed a security breach, according to the firm an international cyber criminals gang gained access to its internal network. Experts at cybersecurity firm Resecurity attributed the attack to Iranian threat actors. Hackers […]


Mobile, Network security, Wireless security

5G brings great opportunities but requires a network transformation

May 1, 2019

Via: Help Net Security

Telecom operators are overwhelmingly optimistic about the 5G business outlook and are moving forward aggressively with deployment plans. Twelve percent of operators expect to roll out 5G services in 2019, and an additional 86 percent expect to be delivering 5G […]


Network security

Why You Need a Healthy Mix of Security Analytics to Investigate Threats

April 26, 2019

Via: Security Intelligence

Effective threat management requires security teams to combine security analytics with the abundance of machine-generated data that is prevalent in most enterprise environments. Tools such as network traffic analysis, endpoint detection, security information and event management (SIEM), and user behavior […]


Vulnerabilities

Network DoS Attack on PLCs Can Disrupt Physical Processes

April 18, 2019

Via: Security Week

A team of researchers has demonstrated an interesting type of denial-of-service (DoS) attack on programmable logic controllers (PLCs), where network flooding can lead to the disruption of the physical process controlled by the device. A paper titled “You Snooze, You […]


Malware, Phishing

Bad security hygiene still a major risk for enterprise IT networks

April 16, 2019

Via: Help Net Security

Unpatched vulnerabilities, along with growing network and application complexity pose an ongoing security risk which could threaten the security of enterprise IT networks. Analyzing the biggest security findings over the past year, Keysight has released the third annual security report […]


Network security

Huawei could be banned from Westminster following “shoddy” security

April 8, 2019

Via: TechRadar

GCHQ has suggested that mobile operators could be banned from using Huawei equipment in and around Westminster due to concerns about the company’s software engineering practices. All four major UK operators use Huawei’s radio equipment in their networks, but its […]


Network security

Cyber criminals using tactic to spread to other connected networks, research finds

April 2, 2019

Via: The Hill

Cyber criminals who have infiltrated one group’s networks are increasingly using a tactic known as “island hopping” to enter other connected networks, security researchers warned Tuesday. Researchers for the security firm Carbon Black said in a new report that 50 […]


Network security

New blockchain system uses reputation to fend off 51 percent attacks

March 27, 2019

Via: Help Net Security

A blockchain system has been proposed to guarantee proper performance even when more than 51% of the system’s computing power is controlled by an attacker. The system, RepuCoin, introduces the concept of “reputation” to blockchain, effectively making it thousands of […]