Mobile security, Network security, Security
July 25, 2019
Via: Security WeekBuilding upon existing 4G Long-Term Evolution (LTE) infrastructure, 5G is designed to improve bandwidth, capacity, and reliability of wireless broadband services. The technology is intended to meet increasing data and communication requirements, offering capacity for tens of billions of connected […]
June 28, 2019
Via: Threat PostIntroduced to the market nearly two decades ago, enterprise VPN technology has been uniquely enduring. Most large organizations still employ a VPN solution, and many seem to rely on it unquestioningly to provide secure remote access. It’s a rarefied position […]
June 27, 2019
Via: Help Net SecurityOne of the biggest challenges for all organizations was a lack of agility, making it difficult for their teams to investigate and respond quickly and accurately to security threats or outages, according to Endace. The study Challenges of Managing and […]
June 21, 2019
Via: Help Net SecurityThe number of devices connected to the Internet, including the machines, sensors, and cameras that make up the Internet of Things (IoT), continues to grow at a steady pace. A new forecast from IDC estimates that there will be 41.6 […]
June 20, 2019
Via: Help Net SecurityBotnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered significant changes taking place in the coding of malware used to create bots, operations, and […]
June 7, 2019
Via: Help Net SecurityA new study – undertaken by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, and underwritten by Bromium – provides details of first-hand intelligence gathered from covert discussions with dark net vendors, alongside analysis by a […]
Cloud security, Network security, Security
June 6, 2019
Via: Threat PostInternet of things (IoT) device security continues to worry the tech industry – however, experts believe that the right type of global regulation could be key for ensuring security standards. The question is when those regulatory efforts will be fleshed […]
May 29, 2019
Via: Security WeekAlso tracked as APT27, TG-3390, Bronze Union, and Lucky Mouse, the threat group has been active since at least 2010, targeting hundreds of organizations worldwide, including U.S. defense contractors, financial services firms, a European drone maker, and a national data […]
Network security, Threats & Malware, Vulnerabilities
May 15, 2019
Via: Help Net SecurityNetworks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t regularly review your network, potential weaknesses and vulnerabilities will stack up. […]
May 8, 2019
Via: Threat PostA critical vulnerability in the Cisco Elastic Services Controller could allow an unauthenticated, remote attacker to take full control of impacted systems – merely by sending a crafted request. Cisco Elastic Services Controller is a virtual network functions manager, which […]
Mobile security, Network security, Security
May 8, 2019
Via: Help Net SecurityMobile service providers anticipate significant new revenue opportunities from the coming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they also believe much-improved security will be essential to realizing that potential. A new global […]
May 7, 2019
Via: Threat PostIt’s no secret IoT security has been a dumpster fire. Last week, it was reported two million IP security cameras, baby monitors and smart doorbells have serious IoT flaws with no known patches. The list, of course, is added to […]
May 2, 2019
Via: Security AffairsIn March, the American multinational software company Citrix disclosed a security breach, according to the firm an international cyber criminals gang gained access to its internal network. Experts at cybersecurity firm Resecurity attributed the attack to Iranian threat actors. Hackers […]
Mobile, Network security, Wireless security
May 1, 2019
Via: Help Net SecurityTelecom operators are overwhelmingly optimistic about the 5G business outlook and are moving forward aggressively with deployment plans. Twelve percent of operators expect to roll out 5G services in 2019, and an additional 86 percent expect to be delivering 5G […]
April 26, 2019
Via: Security IntelligenceEffective threat management requires security teams to combine security analytics with the abundance of machine-generated data that is prevalent in most enterprise environments. Tools such as network traffic analysis, endpoint detection, security information and event management (SIEM), and user behavior […]
April 18, 2019
Via: Security WeekA team of researchers has demonstrated an interesting type of denial-of-service (DoS) attack on programmable logic controllers (PLCs), where network flooding can lead to the disruption of the physical process controlled by the device. A paper titled “You Snooze, You […]
April 16, 2019
Via: Help Net SecurityUnpatched vulnerabilities, along with growing network and application complexity pose an ongoing security risk which could threaten the security of enterprise IT networks. Analyzing the biggest security findings over the past year, Keysight has released the third annual security report […]
April 8, 2019
Via: TechRadarGCHQ has suggested that mobile operators could be banned from using Huawei equipment in and around Westminster due to concerns about the company’s software engineering practices. All four major UK operators use Huawei’s radio equipment in their networks, but its […]
April 2, 2019
Via: The HillCyber criminals who have infiltrated one group’s networks are increasingly using a tactic known as “island hopping” to enter other connected networks, security researchers warned Tuesday. Researchers for the security firm Carbon Black said in a new report that 50 […]
March 27, 2019
Via: Help Net SecurityA blockchain system has been proposed to guarantee proper performance even when more than 51% of the system’s computing power is controlled by an attacker. The system, RepuCoin, introduces the concept of “reputation” to blockchain, effectively making it thousands of […]