networking
New Linksys Smart Wi-Fi Routers with AC technology
The Linksys Smart Wi-Fi Router AC 1200 and AC 1750 are available immediately and the Linksys Smart Wi-Fi Router AC 1600, model EA6400, is planned for availability in late May. …
Widely used routers easy to hack even by remote attackers
Security researchers from Independent Security Evaluators have tested thirteen widely used small office/home office routers and wireless access points, and have discovered …
Nipper Studio: A new approach to security auditing
Developed by UK-based Titania Ltd., Nipper Studio is an interesting solution that takes a whole new approach towards security auditing. Wouldn't it be great to be able to …
The security risks of using Wi-Fi on the Tube
The arrival of widespread public Wi-Fi access across London Underground has been broadly welcomed by the general public, particularly those with smartphones and tablets who …
IEEE to explore 400 Gb/s Ethernet
IEEE, the world’s largest professional organization advancing technology for humanity, today launched an IEEE 802.3 “Standard for Ethernet” study group to …
Wi-Fi sensors for remote monitoring
Monnit released a new line of Wi-Fi sensors, known as MoWi. These sensors use an integrated, 2.4GHz – 802.11b/g, FCC/CE certified radio transmitter. This allows them to …
First direct silicon-to-photonics-based router family
Compass-EOS announced r10004, the first in a family of next-generation, core-grade modular routers. The r10004 is three times smaller than comparable core routers and supports …
Test malware handling capabilities of network security devices
At RSA Conference 2013 in San Francisco, Spirent Communications announced the release of malware testing capabilities on Spirent Studio. With the addition of malware testing, …
Researcher warns about critical flaw in D-Link routers
A security flaw in D-Link’s DIR-300 and DIR-600 routers could allow remote attackers to inject execute arbitrary shell commands via a simple POST request without being …
Wireless Reconnaissance in Penetration Testing
Reconnaissance should always be the first stage of a cyber attack or penetration test, and the success of these attempts is usually closely tied with the quality of …
List of products affected by the vulnerable Broadcom UPnP stack
Recently, DefenseCode researchers have uncovered a high-risk Broadcom UPnP stack remote root vulnerability. The vulnerability is located within the wanipc and wanppp modules …
Cisco unveils open networking “fabric” for data centers, clouds
Network speed, latency, and greater network port density in a single unit are key considerations for customers deploying virtualized data centers and moving to a managed cloud …