networking

The realities of WiFi troubleshooting
WiFi continues to be the source of serious problems and confusion in enterprise K-12 and higher education. The most common issues reported were WiFi association and WiFi …

New Linksys WRT3200ACM open source Wi-Fi router is optimization ready
Linksys announced the next generation of its one and only WRT router – the WRT3200ACM. It features Tri-Stream 160 technology creating the fastest Dual Band router …

IEEE 802.3bz standard brings 2.5 and 5 Gb/s to existing cabling
The Ethernet Alliance hailed ratification of IEEE 802.3bz, Standard for Ethernet Amendment: Media Access Control Parameters, Physical Layers and Management Parameters for 2.5 …

Why DNS shouldn’t be used for data transport
Malicious DNS tunnelling is a big problem in cybersecurity. The technique involves the use of the Domain Name System (DNS) protocol to smuggle sensitive corporate or personal …

Organization must modify the network access policy to address IoT devices
By 2020, 21 billion of Internet of Things (IoT) devices will be in use worldwide. Of these, close to 6 percent will be in use for industrial IoT applications. However, IT …

Network monitoring tips for an increasingly unsafe world
Enterprise IT has evolved significantly over the last decade. Today, IT teams are not only responsible for the availability and performance of their network but also the …

Cisco’s small business Wi-Fi routers open to attack, no patch available
Security researcher Samuel Huntley has discovered four vulnerabilities in Cisco’s RV range of small business Wi-Fi routers, the worst of which could allow an …

Netgear removes crypto keys hard-coded in routers
Qualys security researcher Mandar Jadhav has discovered two serious vulnerabilities in Netgear D6000 and D3600 modem routers, which can be exploited to gain access to the …

Ubiquiti routers hit by backdoor-generating worm
A worm targeting wireless network equipment developed by US-based Ubiquiti Networks has already managed to compromise thousands of routers across the world. To spread it, …

A rogue access point at RSA Conference? Here’s what happened
Ever since businesses began to offer Wi-Fi access to customers, experts have warned that open hotspots are not secure. Open Wi-Fi hotspots don’t ask a user for a …

1 in 3 home routers will be used as public Wi-Fi hotspots by 2017
Juniper Research predicts that at least 1 in 3 home routers will be used as public Wi-Fi hotspots by 2017, and that the total installed base of such dual-use routers will …

Cisco kills hardcoded password bug in Wi-Fi access points
Along with fixes for a number of older vulnerabilities in Cisco IOS and IOS XE software, the Cisco IOS Software Common Industrial Protocol, and the OpenSSL package …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility