Please turn on your JavaScript for this page to function normally.
Video: Hacking Huawei VRP

Huawei routers are no longer devices only seen in China. Entire countries run their Internet infrastructure exclusively on these products and established tier 1 ISPs make …

Cyber security needs to be a board level issue

As part of the much talked about Cyber Security Strategy, the UK Government is “committed to helping reduce vulnerability to attack and ensure that the UK is the safest …

Cisco releases three 802.11ac powered Smart Wi-Fi Routers

Cisco Linksys announced the expansion of its Linksys Smart Wi-Fi portfolio with three 802.11ac powered Smart Wi-Fi Routers, a new compact 802.11ac USB adapter, new features …

Designing and Implementing a Server Infrastructure

Prepare for Exam 70-413 and help demonstrate your real-world mastery of enterprise server design and implementation. Designed for experienced, MCSA-certified professionals …

Week in review: Remote Linksys 0-day root exploit discovered, the Pobelka botnet, and a year of Microsoft patches

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Looking back at a year of Microsoft patches Last year …

New RAT family makes its traffic look legitimate

RATs – Remote Access Trojans – are often used by cyber attackers to maintain a foothold in the infected computers and make them do things unbeknownst to their …

Security vulnerabilities in ESPN ScoreCenter mobile app

ESPN ScoreCenter, one of the most popular mobile sports apps on the market, has significant security vulnerabilities that could compromise users’ mobile devices, …

Why Facebook Graph Search will help cybercriminals

While Facebook’s newly announced graph search capability is awesome for people who like social networking, it also provides criminals with another source of information …

The end of strong password-only security

More than 90% of user-generated passwords will be vulnerable to hacking in a matter of seconds, according to Deloitte’s Canadian Technology, Media & …

Large-scale DDoS attacks grow bigger and more diversified

In addition to increasing attack sizes, attack volume grew in Q4 2012 and reached the highest number of attacks Prolexic has logged for one quarter. Traditional Layer 3 and …

ObjectRocket launches MongoDB cloud service

ObjectRocket launched its fast and scalable MongoDB database-as-a-service (DBaaS). The platform is specifically architected to provide a fast and predictable MongoDB …

Embracing BYOD means understanding cloud and application security

Company policies supporting Bring Your Own Device are being widely embraced as a win-win initiative that improves employees’ experience and reduces IT costs, according …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools