Machine learning is having a substantial impact on the future of security. One of the biggest examples is with modern VPNs. Taylor Francis Online recently published a report titled “Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features.” This report shows that VPNs use a number of machine learning technology, […]
How blockchain will manage networks
Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. Ethernet also hard to manage because it’s centralized. It’s out-of-date, and it needs revamping, researchers say. One attempt to address the issue is the Marconi protocol, which is a strategy to shift network and […]
Cisco uncorks 26 security patches for switches, firewalls
Cisco has bundled 25 security advisories that describe 26 vulnerabilities in Cisco NX-OS switch and Firepower FXOS firewall software. While the 26 alerts describe vulnerabilities that have a Security Impact Rating of “High,” most –23 – affect Cisco NX-OS software, and the remaining three involve both software packages. [ Also see What to consider when […]
Huawei’s possible lawsuit, ransomware readiness, old malware resurfaces | TECH(feed)
The ongoing battle between the U.S. and Huawei could soon go to court as Huawei reportedly prepares to sue the U.S. government. Plus, 2019 will see ride sharing companies going public… but which will be first? And as a decade-old malware resurfaces in enterprise networks, a report questions if the world is ready for the […]
Cryptocurrency miners exploit Docker flaw
According to Imperva research, a container flaw reported last month (CVE-2019-5736) in Docker’s remote API has already been taken advantage of by hundreds of attackers. Imperva claims that they were able to locate 3,822 Docker hosts with the remote API (port 2735) publicly exposed. Of these, approximately 400 were accessible, and most of these were […]
Container Escape Hack Targets Vulnerable Linux Kernel
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Cisco warns a critical patch is needed for a remote access firewall, VPN and router
Cisco is warning organizations with remote users that have deployed a particular Cisco wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network. The vulnerability, which has an impact rating of 9.8 out of 10 on the Common Vulnerability Scoring System lets a potential attacker […]
How Secure Are The Most Popular Mobile Payment Methods?
As technology gets increasingly more advanced, things become smaller and easier to access than ever before — including our shopping and spending habits. The switch from using physical cash first moved to payments through checks before onward to credit cards. Now we process payments entirely online with a series of numbers without ever taking a […]
Protecting the IoT: 3 things you must include in an IoT security plan
With many IT projects, security is often an afterthought, but that approach puts the business at significant risk. The rise of IoT adds orders of magnitude more devices to a network, which creates many more entry points for threat actors to breach. A bigger problem is that many IoT devices are easier to hack than […]
‘Cloudborne’ IaaS Attack Allows Persistent Backdoors in the Cloud
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.