A new Linux malware, GTPDOOR, specifically designed to target telecom networks connected to GPRS roaming exchanges (GRX), has emerged. This malware stands out because it utilizes the GPRS Tunnelling Protocol (GTP) for command-and-control (C2) communi...
Home and small office routers are critical to the security of the small networks connected through broadband and yet until quite recently they were barely talked about as a possible security vulnerability. Beyond telling people to use Wi-Fi encryption they were ignored.
Modern networks now go beyond traditional walls to include data centers, endpoints, virtual, mobile and the cloud. These extended networks and their components constantly evolve and span new attack vectors including: mobile devices, web- enabled and mobile applications, hypervisors, social media, web browsers, home computers, and even vehicles.
Criminals setting up fake domains for phishing are prone to use the same words over and over and spotting those words can help identify malicious sites, according to a new threat detection model from OpenDNS.
The Internet Systems Consortium website is offline today after the non-profit domain name service maintainer announced its website had possibly become infected with malware.
Relying on a DMZ to protect your network and data is like putting money in a bank that depends on one guard and a single gate to secure its deposits. Imagine how tempting all those piles of money would be to those who had access
This is a short post on how to exploit MS14-068 on Linux. This came up on my recent internal infrastructure engagement. The primary DC was a vulnerable Windows 2008 R2 SP1 server.
DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises, half-year figures from Chinese mitigation vendor NSFOCUS have confirmed.
The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropout in his spare time may turn out to be one of the best solutions to thwart those efforts.
In the wake of the celebrity photo breach, the media is humming with stories disparaging the safety of the cloud. Many longtime cloud critics are crowing, "I told you so!" and waiting for the world to go back to on-premises solutions only.
Attackers suspected of residing in Russia are raiding Swiss bank accounts with a multi-faceted attack that intercepts SMS tokens and changes domain name system settings, researchers have warned.
EVERNOTE, DEEZER AND FEEDLY have revealed that they have been struck by hackers, with the firms admitting on Tuesday to having suffered distributed denial of service (DDoS) attacks.
Here's a surprise for you: We actually have a fairly good understanding of who is attacking us on the Internet and why. Various entities know not only which groups are doing the attacking, but also the names of the people in those groups. They know where they live, who their family members are, where they went to school, and when they go on vacation.
DNS providers Nominum have published new data on DNS-based DDoS amplification attacks that are using home and small office routers as a jumping off point.