Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Cisco network
Reliability, security and QoS are critical when evaluating networking solutions providers

Reliability, security and quality of service all rank above cost when evaluating networking solutions providers. Spiceworks surveyed U.S.-based IT professionals who have …

Cisco switch
Cisco patches leaked 0-day in 300+ of its switches

Cisco has plugged a critical security hole in over 300 of its switches, and is urging users to apply the patches as soon as possible because an exploit for it has been …

BrickerBot bricked 2 million IoT devices, its author claims

The author of BrickerBot, which “bricks” IoT devices by rewriting the flash storage space and wiping files, has emerged to explain that the malware first attempts …

Cisco
300+ Cisco switches affected by critical bug found in Vault 7 data dump

While combing through WikiLeaks’ Vault 7 data dump, Cisco has unearthed a critical vulnerability affecting 300+ of its switches and one gateway that could be exploited …

Ubiquiti Networks NanoStation
Unpatched flaw opens Ubiquiti Networks devices to compromise

A critical vulnerability in many of Ubiquiti Networks’ networking devices can be exploited by attackers to take over control of the device and, if that device acts as a …

signal
The realities of WiFi troubleshooting

WiFi continues to be the source of serious problems and confusion in enterprise K-12 and higher education. The most common issues reported were WiFi association and WiFi …

Linksys WRT3200ACM
New Linksys WRT3200ACM open source Wi-Fi router is optimization ready

Linksys announced the next generation of its one and only WRT router – the WRT3200ACM. It features Tri-Stream 160 technology creating the fastest Dual Band router …

IEEE 802.3bz standard brings 2.5 and 5 Gb/s to existing cabling

The Ethernet Alliance hailed ratification of IEEE 802.3bz, Standard for Ethernet Amendment: Media Access Control Parameters, Physical Layers and Management Parameters for 2.5 …

traffic
Why DNS shouldn’t be used for data transport

Malicious DNS tunnelling is a big problem in cybersecurity. The technique involves the use of the Domain Name System (DNS) protocol to smuggle sensitive corporate or personal …

IoT
Organization must modify the network access policy to address IoT devices

By 2020, 21 billion of Internet of Things (IoT) devices will be in use worldwide. Of these, close to 6 percent will be in use for industrial IoT applications. However, IT …

city night
Network monitoring tips for an increasingly unsafe world

Enterprise IT has evolved significantly over the last decade. Today, IT teams are not only responsible for the availability and performance of their network but also the …

cisco small business router
Cisco’s small business Wi-Fi routers open to attack, no patch available

Security researcher Samuel Huntley has discovered four vulnerabilities in Cisco’s RV range of small business Wi-Fi routers, the worst of which could allow an …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools