Firewalls

Keep your local data private with these firewall products.

08 firewall
cisco fiirepower screenshot

code big data binary programming

Java and Python FTP attacks can punch holes through firewalls

The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks.

bodium castle fortress

How Google reinvented security and eliminated the need for firewalls

In some ways, Google is like every other large enterprise. It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter. ...

security code big data cyberespionage byte

DoS technique lets a single laptop take down an enterprise firewall

Researchers have found a new attack technique in the wild that allows a single laptop to take down high-bandwidth enterprise firewalls.

open source alternatives routing firewall 1

5 open source alternatives for routing/firewall

We reviewed 5 open source software products that offers an economical and flexible option for deploying basic home, SMB or even enterprise networking.

NSA headquarters

Alleged NSA data dump contain hacking tools rarely seen

A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen.

20151027 openworld dell sign

Dell patches critical flaws in SonicWALL Global Management System

Dell has patched several critical flaws in its central management system for SonicWALL enterprise security appliances, such as firewalls and VPN gateways.

f secure ransomeware

Why ransomware criminals need great customer service

Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers.

Firewall

4 tools for managing firewall rules

Poorly managed firewall rules can lead to security disasters. Here, security managers in the IT Central Station community review the top firewall management suites: Tufin, AlgoSec, FireMon and RedSeal.

computer security

Are you failing Security Basics 101?

Patching, backups, firewall configuration … when it comes to security, make sure you take care of your infrastructure before you invest in next-level tools.

telekom security

Deutsche Telekom to boost security offering for European enterprises

Deutsche Telekom is introducing new services to help prevent "bring your own device" from turning into "bring your own disaster" for corporate networks.

20151005 cisco headquarters sign

Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking

Cisco Systems patched a critical vulnerability that could allow remote attackers to take over Cisco Adaptive Security Appliance (ASA) firewalls configured as virtual private network servers by simply sending malformed network packets...

juniper netscreen 5200 firewall

The Juniper VPN backdoor: buggy code with a dose of shady NSA crypto

Juniper was using a known flawed random number generator as the foundation for cryptographic operations in NetScreen's ScreenOS and the safeguards it put in place were ineffective.

easedropping backdoor listening

After Juniper security mess, Cisco searches own gear for backdoors

While it says it has no reason to think there are backdoors in any of its products, Cisco has started an additional review of code in its products looking for “malicious modifications.”

juniper netscreen 5200 2

Bad actors race to exploit Juniper firewall vulnerability

Now that Juniper has created a patch for its vulnerable firewall/VPN appliances, bad actors are setting to work reverse engineering the flaw so they can exploit devices that users don’t patch, and profit by selling the exploits to...

juniper netscreen 5200 2

Juniper firewalls compromised by spy code: What you need to know

Juniper Networks is warning customers to patch their NetScreen enterprise firewalls against spyware that enables attackers to take over the machines and decrypt VPN traffic among corporate sites and with mobile employees.

juniper netscreen 5200 2

Juniper warns of spying code in firewalls

Juniper, a major manufacturer of networking equipment, said on Thursday it found spying code planted in certain models of its firewalls, an alarming discovery that echoes of state-sponsored tampering.

Security building blocks

Shades of Greynets: The Internet of Secure Things

The plummeting costs of computing is leading to ubiquitous computing with the Internet of Things, security could be the next beneficiary of this revolution.

Load More