![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094122/5G-2-400x200.jpg)
Global 5G connections reach 17.7 million, 59 5G commercial networks live
Customers are making 5G the fastest growing generation of cellular wireless technology in terms of new subscriptions, according to 5G Americas. According to data based from …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094125/5G-400x200.jpg)
Can 5G make you more vulnerable to cyberattacks?
Many enterprises and sectors are unaware of the 5G security vulnerabilities that exist today. Choice IoT says it’s critical for businesses to have a plan for discovering and …
![pppd](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/09161315/pppd-400x200.jpg)
PPP Daemon flaw opens Linux distros, networking devices to takeover attacks
A vulnerability (CVE-2020-8597) in the Point-to-Point Protocol Daemon (pppd) software, which comes installed on many Linux-based and Unix-like operating systems and networking …
![US Army](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094136/us_army2-400x200.jpg)
SymTCP: New approach to protecting Army systems without massive amounts of manual intervention
An approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies, has been identified by …
![geometry](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094019/geometry-400x200.jpg)
Combat complexity to prevent cybersecurity fatigue
In today’s security landscape, the average company uses more than 20 security technologies. While vendor consolidation is steadily increasing with 86 percent of organizations …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
Organizations lack confidence in their network security
IoT is barreling toward the enterprise, but organizations remain highly vulnerable to IoT-based attacks, according to Extreme Networks. The report, which surveyed 540 IT …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
A closer look at the global threat landscape
60% of initial entries into victims’ networks leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers to rely less on deception to …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/06094247/5g-earth-400x200.jpg)
In 2020, 5G deployments will continue at a frantic pace
The implementation of massive MIMO in 5G systems is changing, according to a Mobile Experts report. There’s a shift away from the dominant position of 64T64R mMIMO, …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104753/iot-1-400x200.jpg)
How IoT devices open a portal for chaos across the network
Shadow IoT devices pose a significant threat to enterprise networks, according to a new report from Infoblox. The report surveyed 2,650 IT professionals across the US, UK, …
![Network](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102932/network-bot-400x200.jpg)
Interconnectivity and networking predictions for 2020 and beyond
Traditional networking and interconnectivity approaches are not handling the pressures being placed on traditional computer networking, according to Stateless. The challenges …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094905/5g-400x200.jpg)
Secure 5G networks: EU toolbox of risk mitigating measures
EU Member States have identified risks and vulnerabilities at national level and published a joint EU risk assessment. Through the toolbox, the Member States are committing to …
![LoRaWAN](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/22110853/lorawan-earth-400x200.jpg)
How to detect and prevent issues with vulnerable LoRaWAN networks
IOActive researchers found that the LoRaWAN protocol – which is used across the globe to transmit data to and from IoT devices in smart cities, Industrial IoT, smart homes, …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD