Access control and authentication - News, Features, and Slideshows
- DNS hijacking vulnerability affects D-Link DSL router, possibly other devices
- Cisco integration gives Samsung Knox users more options for secure connectivity
Samsung Electronics smartphones and tablets protected using the company's Knox security technology have been integrated with VPNs from Cisco Systems, giving enterprises more options for communicating securely.
By Mikael Ricknäs | 29 January, 2015 00:00
A vulnerability found in a DSL router model from D-Link allows remote hackers to change its DNS (Domain Name System) settings and hijack users' traffic. The issue might also affect other devices because it is located in a popular firmware used by different manufacturers, according to a security researcher.
By Lucian Constantin | 28 January, 2015 05:20
Over 5,000 devices used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated from the Internet by malicious attackers.
By Lucian Constantin | 24 January, 2015 01:06
Google ignored Microsoft's calls for flexible vulnerability disclosure deadlines and released details of another unpatched Windows flaw, leaving users exposed for at least the next 25 days.
By Lucian Constantin | 16 January, 2015 23:01
A vulnerability in Asuswrt, the firmware running on many wireless router models from Asustek Computer, allows attackers to completely compromise the affected devices. Malicious hackers, however, need to launch their attacks from within the local networks served by the vulnerable routers.
By Lucian Constantin | 10 January, 2015 02:56
Developers being overly trusting is one of them.
By Kenneth van Wyk | 21 May, 2013 20:56
An assessment of the information security department shows that it has a lot of growing up to do yet.
By Mathias Thurman | 05 November, 2012 11:15
This guide is intended for companies, organizations, and IT professionals who are looking for a network and application monitoring tool that provides a holistic view of application performance, including performance monitoring, from the end-user perspective.
- Microsoft updates cloud-based SQL Server to simplify management
- Intuit backpedals from TurboTax changes after upgrade uproar
- Can't keep this bad boy down: ZeroAccess botnet back in business
- Ghost Linux vulnerability can be exploited through WordPress, other PHP apps
- BT to test 500Mbps broadband over copper in two towns
- The Upload: Your tech news briefing for Friday, January 30
- Military-funded robots can learn by watching YouTube
- Turn your whistling into song with the tap of an app
- PayPal’s BattleHack comes to Australia for a second time
- VPN providers play 'cat-and-mouse' with China's growing censorship
- Data retention inquiry kept in the dark on costs
- A look at real-time brain-to-exoskeleton information transmission
- Facebook tests delivering tips about your location
- How three small credit card transactions could reveal your identity