The recent release of I2P 2.5.0, an anonymous P2P network that protects against online censorship, surveillance, and monitoring, has brought a slew of improvements and new features that will certainly intrigue security practitioners. This release aim...
Businesses rely on their networks to stay connected and productive. When something goes wrong with the network, it can cause significant disruptions in workflow. That's why it's essential to have a network monitoring system to help you detect and fix problems before they cause any damage. This post will discuss seven key benefits of network monitoring.
After nearly two years of adopting major network and security changes wrought by COVID-19 and hybrid work, weary IT network and security teams didn’t need another big issue to take care of, but they have one: Stemming potential damage from the recently disclosed vulnerability in open source Java-logging Apache Log4j software.
Even the best of ideas can take their own sweet time making it into the Linux kernel. Learn how WireGuard - rather than OpenVPN or IKEv2 - made it into the Linux kernel.
Protecting your wireless networks from infiltrators is critically important in keeing your Linux environment secure! Check out these eight great wireless hacking tools for Linux.
This LinuxSecurity.com article featured on the frontpage of Slashdot examines the concept of geo filtering and how it could add a valuable layer of security to your firewall, and explores how the Geolocation for nftables project is leveraging Open Source to provide intuitive, customizable geo filtering on Linux.
The best way to improve and guarantee your network’s security is by continuously testing it, looking for flaws to fix. Penetration testing an excellent method of verifying and improving network security. Here's what you need to know about network pentesting.
The IPFire 2.25 Core Update 153 release brings WPA3 support to the hardened open-source firewall Linux distro - making Wi-Fi safe again for IPFire users.
The Windows Subsystem for Linux 2 will bypass the Windows 10 firewall and any configured rules, raising security concerns for those who use the feature - the main concern being a lack of awareness of this change.
Linux network stack maintainerDavid Millerhascommittedthe WireGuard VPN project into the Linux "net-next" source tree. Miller maintains bothnetandnet-next—the source trees governing the current implementation of the Linux kernel networking stack and the implementation of thenextLinux kernel's networking stack, respectively. Learn more:
The traditional VPN is being replaced by a smarter, safer approach to network security that treats everyone as equally untrusted. Learn more about zero trust and how getting started with a zero-trust security model could improve your business's security posture:
A group of researchers have found 11 flaws in 5G protocols, several of which would expose a device’s location and when a user calls or sends texts, compromising privacy and security. Learn more in an interesting Security Today article:
VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN:
Are you familiar with Wireguard? The Wireguard VPN offers better performance and a simpler, effective approach to cryptography. Learn more in this interesting CSO article:
Interested in what the future has in store for VPNs? Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the IoT need protection. We'd love to hear your thoughts on this article.
Market consolidation, transparent operation, greater intelligence: If this were Jeopardy, here's where you'd say, "What's the future of the VPN market look like?" Then you'd be on to Technology Forecasts for $500.
What isn't in question is that virtual private networking technology will remain critical to protecting users, organizations, and their data. What is changing, according to industry experts, is the degree of automation and intelligence in VPN technology, not to mention the degree to which VPN functionality resides less in the hands of users (consistently cited as secure networking's weakest link) and more on the back end of the network. But continued growth of cloud services and the Internet of Things (Iot) means secure connectivity will still be needed.
On November 12, 2018, a small ISP in Nigeria made a mistake while updating its network infrastructure that highlights a critical flaw in the fabric of the Internet. The mistake effectively brought down Google — one of the largest tech companies in the world — for 74 minutes.
This should come as no surprise, but it still sucks big-time: thousands of people who downloaded a random, very popular app called WiFi Finder found that it got handsy with users’ own home Wi-Fi, uploading their network passwords to a database full of 2 million passwords that was found exposed and unprotected online.
A group of academics from South Korea have identified 36 new vulnerabilities in the Long-Term Evolution (LTE) standard used by thousands of mobile networks and hundreds of millions of users across the world.
Over the past 18 months, revelations about wireless carriers selling smartphone location data to third parties have forced telecoms to promise reform. Worryingly, but perhaps not surprisingly, these user protections have been slow to actually materialize. Even if carriers shape up, though, an attacker can still track a smartphone's location and snoop on phone calls thanks to newly discovered flaws in 4G and even 5G protocols.