Tag "Network Security"

Back to homepage
Hardware/Network

Average DDoS attack sizes decrease 85% due to FBI’s shutdown of DDoS-for-hire websites

The FBI’s shutdown of the 15 largest distributed denial-of-service (DDoS) for hire vendors (booters) reduced the overall number of attacks worldwide by nearly 11 percent compared to the same period

Mobile

The privacy risks of pre-installed software on Android devices

 Many pre-installed apps facilitate access to privileged data and resources, without the average user being aware of their presence or being able to uninstall them.On the one hand, the permission

Software

New Mirai variant leverages 11 new exploits and targets smart signage TVs and wireless presentation systems

This new variant now uses 11 new exploits and targets LG Supersign TVs and WePresent WiPG-1000 wireless presentation systems. In addition to using new exploits in its multi-exploit battery, this

Hardware/Network

A network is only as strong as its weakest shard

Blockchain, a nascent technology, has enterprises globally enamored with the promise it holds to fundamentally turn everything from how we interact, transact, store, and manage data on its head. While

Hardware/Network

The Insider Threat – the Top Security Issue of 2019?

You are put at risk by various types of problematic insiders – many of whom are not intending harm. Disgruntled employees may be acting out; they may be “second streamers” looking

Hardware/Network

New IoT Security Bill: Third Time’s the Charm?

The latest bill to set security standards for connected devices sold to the US government has fewer requirements, instead leaving recommendations to the National Institute of Standards and Technology. For

Hardware/Network

Latest trends in automated threat intelligence-driven network security

Since the earliest days of the Internet both network threats and network defenses have been evolving. In this Help Net Security podcast recorded at RSA Conference 2019, Todd Weller, Chief Strategy

Hardware/Network

Data management: the double-edged sword of IoT

Iain Shearman, MD, KCOM NNS shares his best practice tips for data management in the Internet of Things. The Internet of Things (IoT) is nothing new; however, as its potential

Hardware/Network

IT managers can’t ignore endpoints because most cyberattacks start there

IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else, according to the 7 Uncomfortable Truths of Endpoint Security survey by Sophos. In

Industry Insights

Wired for Safety: Cybersecurity built on organization’s clear policies

Editor’s note: Wired for Safety is a column on cybersecurity and other tech issues. Duane Dunston is an assistant professor of cybersecurity and networking at Champlain College. He received his bachelor’s and master’s