Articles about network security

Un-Delled SonicWall beefs up firewall to wrestle ransomware

SonicWall has updated its product range with an eye on ransomware and mesh networking. The privately owned network security vendor last week released six security products and services designed to accelerate speed thresholds across wired, wireless and mobile networks. In particular, the portfolio will include a high speed …
John Leyden, 3 Oct 2017
Stock traders

SEC 'fesses to security breach, says swiped info likely used for dodgy stock-market trading

The US Securities and Exchange Commission (SEC) has admitted that hackers broke into its corporate filling system last year. As-yet unidentified miscreants may have profited from financial tip-offs and other data obtained after hacking into its online EDGAR filing system, the US government's financial trading watchdog admitted …
John Leyden, 21 Sep 2017

More data lost or stolen in first half of 2017 than the whole of last year

More data records were leaked or stolen by miscreants during the first half of 2017 (1.9 billion) than all of 2016 (1.37 billion). Digital security company Gemalto's Breach Level Index (PDF), published Wednesday, found that an average of 10.4 million records are exposed or swiped every day. During the first half of 2017 there …
John Leyden, 20 Sep 2017

Internet hygiene still stinks despite botnet and ransomware flood

Network security has improved little over the last 12 months – millions of vulnerable devices are still exposed on the open internet, leaving them defenceless to the next big malware attack. A follow-up audit by Rapid7 – the firm behind the Metasploit pen-testing tool – found that more than a million endpoints were confirmed …
John Leyden, 14 Jun 2017
Australian money at a crime scene

Cyberattacks wipe more than $50bn off big biz value, say beancounters

Severe cyber-break-ins permanently stripped 1.8 per cent off companies' stock prices, on average, according to a new study out today. Putting that 1.8 per cent drop in context, that dip represents a permanent loss of market capitalization of £120m ($150m) for a typical FTSE 100 biz, we're told. Eggheads at Oxford Economics in …
John Leyden, 12 Apr 2017
Switch

D-Link resolves enterprise switch hacker risk

D-Link has resolved an authentication bypass flaw in one of its enterprise switches. Flaws in the vendor's DGS-1510 enterprise switch kit, discovered by security researchers Varang Amin and Aditya Sood, were resolved with a firmware update (pdf advisory here). Left unresolved, the security bug can create an unauthenticated …
John Leyden, 27 Feb 2017
Confidential on white screen in boardroom. Photo by Shutterstock

Pwnd Android conference phone exposes risk of spies in the boardroom

Security researchers have uncovered a flaw in conference phone systems from Mitel that create a means for hackers to listen in on board meetings. Boffins at Context Information Security managed to gain root access and take full control of a Mitel MiVoice Conference and Video Phone, potentially enabling them to listen to …
John Leyden, 15 Feb 2017

Software exploits overrated - it's the humans you need to be watching

Video Weak passwords and phishing offer far easier mechanisms for breaking into most organizations than exploiting software vulnerabilities. A study by US cybersecurity firm Praetorian based on 100 penetration tests and 450 real-world attacks discovered that stolen credentials offer the best way into enterprise networks. Software …
John Leyden, 22 Aug 2016

DDoS trends: Bigger, badder but not longer

DDoS attacks once again escalated in both size and frequency during the first six months of 2016. Netscout's DDoS mitigation arm Arbor Networks warns that attacks greater than 100Gbps are far from uncommon. The security firm has monitored 274 attacks over 100Gbps in the first half of 2016, versus 223 in all of 2015. The …
John Leyden, 19 Jul 2016

Hackers: Ditch the malware, we're in... Just act like a normal network admin. *Whistles*

Hackers almost exclusively use standard network admin tools to move around a compromised network once they’ve broken in using malware or other hacking techniques. Researchers at security startup LightCyber found that 99 per cent of post-intrusion cyberattack activities did not employ malware, but rather employed standard …
John Leyden, 30 Jun 2016
Robot touches screen with finger. Photo via Shutterstock

Israel and US forge human-free cyber info-sharing pact

The US and Israel and due to announce a bilateral threat sharing programme involving co-operation between the two allies' Computer Emergency Response Teams. The agreement, due to be signed on Tuesday, was trailed in respective conference speeches by Alejandro Mayorkas, deputy secretary of US Homeland Security and Dr Eviatar …
John Leyden, 20 Jun 2016
Burglar sits in kitchen with stolen tablet. Photo by Shutterstock

Cyber burglars love to pillage Euro businesses they've pwned before

Traditional methods including spear phishing and social engineering still account for more than a third of hacker attacks. A new study by Mandiant reports that many hacked European organisations are re–compromised within months of an initial attack, in a similar way to how burglars revisit homes and offices they’ve already …
John Leyden, 8 Jun 2016
Taylor Swift

SWIFT threatens to give insecure banks a slap if they don't shape up

The SWIFT global payments system has announced it plans to suspend banks with weaker cyber defences until they improve their security. The threatened sanction follows a run of attacks on international banks over recent weeks, including the $81m mega-heist at the Bangladeshi Central Bank. These cyber-heists1 relied on hackers …
John Leyden, 3 Jun 2016

Ironic: CCTV systems slide open a backdoor into your biz network

Closed circuit TV systems, designed to protect organisations' physical assets, commonly create holes for hackers to exploit and tunnel their way into enterprise systems. Research carried out by independent consultant Andrew Tierney on behalf of Cloudview – a video surveillance company based in Hampshire, England – found major …
John Leyden, 14 Mar 2016
shutterstock_263560157-nfc

LoopPay hackers may have wanted magnetic card-swipe tech

Samsung’s mobile payment system supplier, LoopPay, was hacked back in March this year, it has emerged. The breach - blamed on a Chinese hacking crew - at the Samsung subsidiary was only discovered in August. Investigators reckon hackers from the so-called Codoso Group were after information to do with the magnetic secure …
John Leyden, 8 Oct 2015

Hackers hid Carphone Warehouse breach with DDoS smokescreen – report

Hackers reportedly swamped Carphone Warehouse with junk traffic as a smokescreen, before breaking into systems and stealing the personal details of 2.4m customers. Up to 90,000 customers may also have had their encrypted credit card details accessed, the UK-based mobile phone reseller admitted at the weekend. Customers with …
John Leyden, 11 Aug 2015
You seen him? Hasidim

How to quietly slurp sensitive data wirelessly from an air-gapped PC

Israeli academics have demonstrated how feature-phones can use GSM radio frequencies to wirelessly siphon data from infected "air-gapped" computers. Air-gapped computers are those kept physically isolated from other networks as a safeguard against hacking. The work by researchers at the Ben-Gurion University of the Negev (BGU …
John Leyden, 29 Jul 2015
padlock

US dominates net-security patents, China, Canada and Oz on the advance

The US, China, Canada and Australia are the world's major sources of security patents, according to analysis by LexInnova. The company issued a report on Friday looking at the market for security patent licensing. It'll come as no surprise that Cisco is the 800-pound gorilla of the security game with 6,442 patents (followed …

Create a news alert about network security, or find more stories about network security.

Biting the hand that feeds IT © 1998–2017