Cisco has exposed 13 vulnerabilities in its IOS and IOS XE switch and router operating software that the company said should be patched as soon as possible. The vulnerabilities were detailed in Cisco’s twice-yearly dump of IOS exposures and all have a High Impact security rating and should be evaluated by users as soon as possible.
Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.
In 2015, a vulnerability was detected in WiFi routers in hotel allowing attackers to distribute malware and monitor and record data sent over the network. A laptop is stolen every 53 seconds in the United States.
The ruthless rampage of Cyberattacks is a worrying trend that threatens organizations of all scale. However, it should not slow down the adoption of latest technology offerings. Instead, devise strategies to ensure that security is met along your transformation journey.
IT admins surveyed by Susan Bradley, who moderates the PatchManagement.org mailing list, said Microsoft's current strategy is failing. So she took their concerns to Microsoft leaders, including CEO Satya Nadella, and asked them to make changes.
One of the most publicized POS breaches happened with American retailer, Target in 2013 where 41 million customer payment card accounts and contact information for more than 60 million Target customers were affected.
Vulnerability management is a key process in any information security program and regulatory compliance framework. Why is it that many companies lag behind on patches and updating their systems?
The sensitivity towards cyber-crime is increasing. VCs are backing those startups that arrived early in the cyber-security space. In India, this industry vertical is still nascent, with around 50 security product startups.
Indian consumers who practice poor router security are at high risk from cyberattacks designed to take over their connected devices, steal passwords and gather other sensitive personal information
The multipurpose ransom-miner was detected by Seqrite experts when they observed a series of evolved malware blocked by the brand’s state-of-the-art security solutions at the customers’ end.