Network security has traditionally focused on border protection strategies – If you could keep the bad guys out, then your computers, users, and data were safe. As next-generation firewalls (NGFWs) and unified threat management (UTM) appliances hit t…
Anonymous browsing with Tor presents serious challenges for IT as well as possible opportunities for organizations that need it. One of my best friends growing up was named Tor. He was Norwegian through and through and looked like he could wield a…
Vulnerability Note VU#936356 Ceragon FiberAir IP-10 Microwave Bridge contains a default root password Original Release date: 16 Jan 2015 | Last revised: 20 Jan 2015 Overview Ceragon FiberAir IP-10 Microwave Bridge contains a default root password.
I am deeply skeptical of the FBI’s announcement on Friday that North Korea was behind last month’s Sony hack . The agency’s evidence is tenuous, and I have a hard time believing it. But I also have trouble believing that the US government would make the accusation this formally if officials didn’t believe it.
Original release date: December 19, 2014 Systems Affected Microsoft Windows Overview US-CERT was recently notified by a trusted third party of cyber threat actors using a Server Message Block (SMB) Worm Tool to conduct cyber exploitation activities recently targeting a major entertainment company.
Researchers at Palo Alto found that many ROM images used for Android smart phones manufactured by Coolpad contain a backdoor, giving an attacker full control of the device.
Vulnerability Note VU#264212 Recursive DNS resolver implementations may follow referrals infinitely Original Release date: 09 Dec 2014 | Last revised: 09 Dec 2014 Overview Recursive DNS resolvers may become stuck following an infinite chain of referrals due to a malicious authoritative server.