Cisco business routers targeted after patch, at least 9,000 vulnerable
Attackers scope out two Cisco router bugs two days after patches were released.
Attackers scope out two Cisco router bugs two days after patches were released.
Governments must be held to higher standards than private enterprises, a former deputy head of the US National Security Agency has said as he backs user behaviour monitoring technology that might have helped his employer catch Edward Snowden before his infamous leaks.
David Braue | 14 Aug | Read more
Developers are demanding answers from Apple after a $400-a-month iPhone VPN become a top grossing app on the App Store.
On October 13, 2015, the Metadata Retention law came into play. On that sad and gloomy day, Australian Federal House of Representatives passed the law labeled “Metadata Retention Law.” The law forces internet service providers (ISPs) and telecommunications companies to keep track, collect and store the communication data of internet users.
Virtual private network (VPN) connections designed to keep data safe from snooping eyes may be vulnerable to two forms of network attacks by malicious parties with access to a local network, a research paper (PDF) explained on June 30. The founders of Cloak, a VPN service with native iOS and OS X apps, say that the more severe of the two vulnerabilities also exists in iOS's most deeply integrated VPN protocol, and can't be mitigated without Apple's involvement.
Glenn Fleishman | 03 Jul | Read more
We've spent the last two weeks looking at applications you can use to protect your computer from unauthorized access: Apple's built-in firewall for incoming access and Little Snitch for monitoring both inbound and outbound network access. But how do you keep people from looking at your network traffic while you're on public Wi-Fi networks, such as those provided by your ISP, your favorite coffee shop, or the local library?
Jeffery Battersby | 09 Jul | Read more
If you work on a computer or mobile device away from home, you probably use Wi-Fi hotspots in hotels, cafés, restaurants, airports, or on campus. The problem is, there is no way to know exactly how secure those networks are.
A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.
Eric Geier | 17 May | Read more