Colasoft Packet Builder is useful tool used for creating custom network packets, you can use this tool to check your network protection...
Showing results 1 to 20 of 99
A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being used in attacks.
The social network has stepped up password security in the past, especially after finding itself the victim of widely reported cyber attacks.
What happens to users and their phones in the event of a mobile malware epidemic or a terrorist attack? Researchers at a California-based lab are hoping to answer those very questions using simulations.
Distributed denial-of-service (DDoS) attacks are on the rise, and, according to Earthwave CEO Carlos Minassian, the situation will get worse when the National Broadband Network (NBN) rolls out.
Malware distributors have launched a new wave of attacks aimed at taking over unpatched PCs and Macs. They look like routine messages from a bank or a social network, but instead of phishing for passwords, they're serving up malware.
By Chris McNabPublished by O'Reilly Media (http://oreilly.com/catalog/9780596510305/)How secure is your network? The best way to...
Akamai, a content-delivery network provider with over 100,000 servers across the world, has released a product to mitigate and defend against DDoS attacks and other web threats
British virtual private network company Hide My Ass has said that it turned over logs on a suspected LulzSec member to the FBI in response to a UK court order.The court order requested information related to an account associated with a number of attacks on computer systems, Hide My Ass said in a blog post on Friday.
TracksTracer Lite allows network administrators to quickly and easily identify attacks against Microsoft IIS Web Servers. This tool...
While security pros and academics disagree about what poses the biggest threat to data, they are both blasé about physical network attacks, says researcher Andreas Mauthe
Network Solutions is reporting on two consecutive DDoS attacks which hit the company's networks.
With a 19-year-old behind bars following network intrusions and denial of service attacks against "a number of international business and intelligence agencies," the fate of LulzSec remains an open question.
Just when it seems the PlayStation Network is finally back online with the PlayStation Store to follow on May 24, hackers are keeping Sony busy with two new cyber attacks today.
Shadow Communications Minister Malcolm Turnbull has said that he's just being honest when he attacks the $43 billion National Broadband Network (NBN) project, despite holding shares in a company that stands to benefit from the NBN.
The country has forged a network of digital 'bunkers' to protect against a repeat of the distributed denial-of-service attacks that hit its networks last year
Attacks that blend techniques to evade detection are slipping past network defences, according to security company Stonesoft.Individual evasion techniques such as packet fragmentation and IP header spoofing are currently detected by network defence tools, Stonesoft chief executive Ilkka Hiidenheimo told ZDNet UK on Monday.
Arbor Networks announced this morning that network provider Vocus has selected its Peakflow platform to protect its network against distributed denial-of-service (DDoS) attacks.
The attacks occurred mostly on WordPress blogs hosted by Network Solutions but it appears that there are multiple security weaknesses in play.
I've been reviewing the use of DHCP as an attack vector -and what I found is the usual thing: most of the attacks follow highly traditional paths with a ten year history of increasingly clever solutions to increasingly clever variations on the same themes. Great, except that it seems to me there's an easy and virtual foolproof way of using DCHP with NAT to blow holes in just about anybody's network "security."
Google is investigating whether employees in its China office were involved in the attacks on its network that led to theft of intellectual property, according to sources.
Cisco Systems wireless local area network equipment used by many corporations around the world is at risk of being used in denial-of-service attacks and data theft, according to a report.
Apple today warned that opening or viewing image files could lead to remote code execution attacks against Mac OS X users.In an update that contains fixes for a total of 19 documented vulnerabilities, Apple said malicious hackers could rig PNG (Portable Network Graphics) and other images to take complete control of unpatched Mac systems.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)