Network Security | News, how-tos, features, reviews, and videos
The planned shortening of the lifespan of TLS certificates to 90 days should ensure more security. However, many companies are not prepared, a survey found.
In a report identifying the most effective and popular subject lines used by phishing attackers, HR was tops, along with “IT: Backup has failed” and “Action Required: Rejected Deposit.” Maybe subject line colons should be bann
The Black Hat series of international cybersecurity conferences brings together top IT security pros, researchers, and thought leaders to discuss the latest cyber techniques, vulnerabilities, threats, and more. Here’s the latest to know.
If you’re looking for a VPN alternative, mesh VPNs could be the answer. Here’s the business case for and against making the switch — and how to started with mesh VPN Tailscale.
Need to secure non-human entities, leaky clouds, and complex environments? These 7 network security startups have bold ideas.
Attack discovered by Guardio researchers shows how criminals can bypass email protections such as DKIM and SPF.
Escalating cyberthreats, hacktivism, and cyber espionage suggest the Paris Games may present the greatest cybersecurity risk ever. Here’s what to look out for and how to prep.
The Domain Name System Security Extensions provides cryptographic authentication to prevent redirection to rogue websites, but owners of many domains have yet to adopt it.
Sharing connection information could be a problem among users of the same VPN server without proper protection, researchers have found. Corporate VPN servers in particular are vulnerable to the flaw.
The malware leverages Modbus TCP communications to target operational technology assets — and can easily be repurposed to compromise other industrial controllers, putting widespread critical infrastructure at risk.