HackDig : Dig high-quality web security articles for hacker

Football and Firewalls: A Winning Game Plan to Improve Network Security

As we approach Thanksgiving in the U.S., the one thing I look forward to the most — aside from turkey and spending time with my family — is football. As I watch the games, the security geek in me can’t help but notice some parallels between football and network security, particularly firewalls and intrusion prevention. Network Security Playbook During
Publish At:2016-11-23 00:40 | Read:4737 | Comments:0 | Tags:Infrastructure Protection Network & Endpoint firewall Firewa

Alleged NSA data dump contain hacking tools rarely seen

A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen, according to security researchers.That includes malware that can infect a device’s firmware and persist, even if the operating system is reinstalled.  “It's terrifying because i
Publish At:2016-08-18 14:00 | Read:3067 | Comments:0 | Tags:Security Hacking Firewalls Government

Dell patches critical flaws in SonicWALL Global Management System

Dell has patched several critical flaws in its central management system for SonicWALL enterprise security appliances, such as firewalls and VPN gateways.If left unfixed, the vulnerabilities allow remote, unauthenticated attackers to gain full control of SonicWALL Global Management System (GMS) deployments and the devices managed through those sy
Publish At:2016-07-22 03:35 | Read:4123 | Comments:0 | Tags:Security Networking Firewalls Patches

Bringing Threat Intelligence to the Device

Previous posts in this series provided an overview of threat intelligence, its role within the IoT space, and how it can be used to prevent threats at the network perimeter in IoT Gateways. With the evolution of internet-connected devices and their growing resource capabilities, these “things” will increasingly become connected directly to the internet, forg
Publish At:2016-04-18 14:20 | Read:3063 | Comments:0 | Tags:IoT Threat Lab firewalls Internet of Things IoT gateways mal

Deutsche Telekom to boost security offering for European enterprises

"Bring your own device" can easily turn into bring your own disaster for corporate networks, if attackers use a compromised device as a bridgehead into a secure environment.That's one of the reasons Deutsche Telekom is partnering with two security companies to offer services to smaller companies that don't have the resources to install and operate their
Publish At:2016-03-19 00:00 | Read:3192 | Comments:0 | Tags:Security Firewalls Mobile Security

Et tu, Fortinet? Hard-coded password raises new backdoor eavesdropping fears

Less than a month after Juniper Network officials disclosed an unauthorized backdoor in the company's NetScreen line of firewalls, researchers have uncovered highly suspicious code in older software from Juniper competitor Fortinet.Further ReadingJuniper drops NSA-developed code following new backdoor revelationsResearchers contradict Juniper claim that Dual
Publish At:2016-01-12 18:50 | Read:3670 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab backdoors eave

The Juniper VPN backdoor: buggy code with a dose of shady NSA crypto

Security researchers and crypto experts have spent the last few days trying to figure out the details of a recently announced backdoor in Juniper NetScreen firewalls that could allow attackers to decrypt VPN (Virtual Private Network) traffic. They believe that they found the answer: a combination of likely malicious third-party modifications and Juniper'
Publish At:2015-12-22 13:40 | Read:3314 | Comments:0 | Tags:Security Encryption Virtual Private Network (VPN) Firewalls

Bad actors race to exploit Juniper firewall vulnerability

Now that Juniper has created a patch for its vulnerable firewall/VPN appliances, bad actors are setting to work reverse engineering the flaw so they can exploit devices that users don’t patch, and also make a profit by selling their exploits to others.“That’s what they do,” says John Pironti, president of IP Architects, who says he spent Friday respondin
Publish At:2015-12-19 13:20 | Read:3520 | Comments:0 | Tags:Security Cyber Attacks/Espionage Firewalls Vulnerability exp

Juniper firewalls compromised by spy code: What you need to know

Juniper Networks is warning customers to patch their NetScreen enterprise firewalls against spyware that enables attackers to take over the machines and decrypt VPN traffic among corporate sites and with mobile employees.The danger is that attackers could exploit the code “to gain administrative access to NetScreen devices and to decrypt VPN connections,
Publish At:2015-12-18 19:15 | Read:2453 | Comments:0 | Tags:Security Cyber Attacks/Espionage Firewalls Privacy

Juniper warns of spying code in firewalls

Juniper, a major manufacturer of networking equipment, said on Thursday it found spying code planted in certain models of its firewalls, an alarming discovery that echoes of state-sponsored tampering.The affected products are those running ScreenOS, one of Juniper's operating systems that runs on a range of appliances that act as firewalls and enable VPN
Publish At:2015-12-18 01:10 | Read:3357 | Comments:0 | Tags:Security Firewalls Government

Are These Four Security Technologies on the Verge of Becoming Obsolete?

Businesses have some serious problems on their hands when it comes to security. Major breaches seem to be occurring at an alarming pace – every other week seems to bring headlines of another large company suffering a security breach, and that doesn’t even begin to touch the thousands of breaches that don’t get media attention.With cyber attacks happening wit
Publish At:2015-10-05 07:20 | Read:3018 | Comments:0 | Tags:Featured Articles Security Awareness firewalls passwords sec

Firewalls can't protect today's connected cars

The Chinese military strategist Sun Tzu once wrote, "What is of supreme importance in war is to attack the enemy's strategy."The automobile industry needs to follow Sun Tzu's advice to secure increasingly connected vehicles from hackers, according to experts.Instead of building firewalls to keep cyber attacks out, which industry watchers say is ultimately a
Publish At:2015-07-24 11:20 | Read:3855 | Comments:0 | Tags:Automotive Firewalls Security Cyber Attacks/Espionage

Web Application Firewall Magic Quadrant 2015

Gartner has published an updated "magic quadrant" report about Web Application Firewall (WAF) vendors.Sixteen vendor offerings are assessed. To be included, the product has to be actively marketed, use techniques designed for web security, and not just use attack signature-based approach found in other devices such as next-generation firewalls and
Publish At:2015-07-21 09:15 | Read:4202 | Comments:0 | Tags:threats technical firewalls corrective detective operation

Evolving the Next-Generation Firewall: The Importance of Being Platform-Based

Why is platform-based a key imperative for next-generation firewalls (NGFWs)? In our previous blog posts, we outlined what it means to be threat-centric, integrating best-in-class security layers with shared intelligence across all layers to combat advanced multi-vector threats.Multiple point products create considerable management complexity and cost for IT
Publish At:2014-09-19 15:20 | Read:2872 | Comments:0 | Tags:Security ASA Cisco ASA with FirePOWER Services firewalls NGF

Why a Next-Generation Firewall Must Be Threat-Centric

In an earlier blog, we discussed the importance of a visibility-driven approach to Next-Generation Firewalls (NGFWs) and the need for capabilities that offer full visibility and contextual awareness into everything on networks since we know you can’t protect what you can’t see.In addition to offering an unprecedented network visibility foundation
Publish At:2014-09-18 18:40 | Read:3646 | Comments:0 | Tags:Security ASA Cisco ASA with FirePOWER Services FirePOWER fir


Share high-quality web security related articles with you:)


Tag Cloud