Networks

IPv6 Will Cause Some Security Headaches

IPv6 is the next-generational internet protocol, designed to give us more IP addresses. Back in the day when no one dreamed that toasters would one day be connected to the Internet, the idea that th...

Defending Against The ‘Apache Killer’ Exploit

The Apache HTTP web server is the most widely deployed Web server on the Internet today and it's at risk from a serious denial of service (DoS) attack.The 'Apache Killer' tool is now out in the wild...

The Pros and Cons of Opal Compliant Drives

  Full-disk encryption (FDE) used to be a software-only proprietary solution. But over the past couple of years, a hardware based hard drive standard has emerged in...

Password Roulette: Betting on Password Storage Apps

Call Ondrej Krehel the poster boy for the password problem that is confronting all of us. Password protection on corporate servers is proving to be dangerously porous -- think Sony, Citigroup, even ...

Is IT Security Just an Illusion?

A recent survey by the Ponemon Institute found that the threat from cyber attacks is nearing statistical certainty -- 90 percent of U.S. businesses were hit by at least one security breach in the la...

How to Configure your Wireless Network from WEP to WPA2

  As you may already know, WEP security can easily be cracked -- which is why it is a good idea to upgrade to WPA2 (Wi-Fi Protected Access 2). WEP security only ...

How to Wipe a Computer Clean

Before you sell or get rid of your computers—whether working or not—you should clean them of sensitive documents and data. To be completely safe, you should do this even if ...

SANS Lists Top 20 Critical Vulnerabilities

Critical software vulnerabilities are increasing being found -- not in the operating system -- but in applications and major databases.The information comes out of a new quarterly report, the Top 20...

Latest articles