VPN Security

Airport VPN hacked using Citadel malware

By

Employees at an international airport were targeted in a multifaceted attack that beat two-factor authentication, and included form-stealing and screen-grabbing functionality.

Encryption bans in the name of fighting terrorism hurt security

Encryption bans in the name of fighting terrorism hurt security

Governments need to fight terrorism in ways other than prohibiting the encryption of networks, a technology that is essential to locking down business' private communication.

Hide My Ass service not as secret as suspect likely believed

By

Some of the evidence used to indict a 23-year-old Phoenix man, accused of hacking into the Sony Pictures website, was gleaned from a supposedly anonymous VPN service.

Lockheed admits to hack that may portend more breaches

By

There remain more questions than answers after defense contractor Lockheed Martin over the weekend disclosed that its systems had been successfully breached.

Report: Lockheed Martin fighting off network attack

By

The major defense contractor Lockheed Martin is experiencing a massive network disruption that may be related to an attack on RSA earlier this year.

Former Gucci insider charged with hacking network

By

A former network engineer at Gucci has been charged with hacking into the company's network, deleting data and shutting down servers and networks.

When it comes to avoiding data breaches, universities can learn from the enterprise

When it comes to avoiding data breaches, universities can learn from the enterprise

With colleges and universities back in session, campus IT departments can take a page out of the enterprise playbook to help them deal with the unique security challenges facing academia.

Google data collection scandal reveals careless security at Wi-Fi access points

Google data collection scandal reveals careless security at Wi-Fi access points

The criticism being levied at Google for its collection of Wi-Fi data is misguided.

Branch office security: What are the real problems?

Branch office security: What are the real problems?

Organizations need not overlook security at their satellite office locations, which may be lacking in on-site IT security expertise.

Disaster recovery: Surge strategies also work for IT staff

Disaster recovery: Surge strategies also work for IT staff

IT departments, when facing the possibility of a disaster, may want to take a page out of the U.S. military's playbook.

Clientless SSL VPN products vulnerable, says US-CERT

By

Many clientless SSL VPN systems operate in a way that bypasses fundamental web browser domain-based security mechanisms, according to a government warning this week.

Patient data check-up: First Medical Management and Fortinet

Patient data check-up: First Medical Management and Fortinet

By

First Medical Management, a health care services provider in California, found a simple way to protect patient records and hospital data, reports Greg Masters

CASE STUDY: Support execs in their use of Apple iPhones

CASE STUDY: Support execs in their use of Apple iPhones

A growing Silicon Valley virtualization company needed to free up bandwidth and support its employees' use of iPhones.

Countering cloud computing threats

Technology such as two-factor authentication systems, when married to encrypted VPN connections, can secure an internet connection into a cloud computing-based service.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US